The Role Of Iot And Blockchain Techniques And Applications Sanjay K Kuanar
The Role Of Iot And Blockchain Techniques And Applications Sanjay K Kuanar
The Role Of Iot And Blockchain Techniques And Applications Sanjay K Kuanar
The Role Of Iot And Blockchain Techniques And Applications Sanjay K Kuanar
1. The Role Of Iot And Blockchain Techniques And
Applications Sanjay K Kuanar download
https://ebookbell.com/product/the-role-of-iot-and-blockchain-
techniques-and-applications-sanjay-k-kuanar-38227978
Explore and download more ebooks at ebookbell.com
2. Here are some recommended products that we believe you will be
interested in. You can click the link to download.
The Role Of Ai Iot And Blockchain In Mitigating The Impact Of Covid19
S Vijayalakshmi
https://ebookbell.com/product/the-role-of-ai-iot-and-blockchain-in-
mitigating-the-impact-of-covid19-s-vijayalakshmi-54665426
The Role Of Internet Of Things Iot In Biomedical Engineering Present
Scenario And Challenges 1st Edition Sushree Bibhuprada B Priyadarshini
https://ebookbell.com/product/the-role-of-internet-of-things-iot-in-
biomedical-engineering-present-scenario-and-challenges-1st-edition-
sushree-bibhuprada-b-priyadarshini-36904484
The Role Of Mathematics In Evolutionary Theory Jun Otsuka
https://ebookbell.com/product/the-role-of-mathematics-in-evolutionary-
theory-jun-otsuka-45547470
The Role Of Nutrition In Cardiometabolic Health Experimental Clinical
And Communitybased Evidence Abeer M Mahmoud Shane A Phillips
https://ebookbell.com/product/the-role-of-nutrition-in-
cardiometabolic-health-experimental-clinical-and-communitybased-
evidence-abeer-m-mahmoud-shane-a-phillips-46073858
3. The Role Of Family Physicians In Older People Care Jacopo Demurtas
https://ebookbell.com/product/the-role-of-family-physicians-in-older-
people-care-jacopo-demurtas-46099350
The Role Of Monitoring And Evaluation In The Un 2030 Sdgs Agenda
Nadini Persaud
https://ebookbell.com/product/the-role-of-monitoring-and-evaluation-
in-the-un-2030-sdgs-agenda-nadini-persaud-46202450
The Role Of Crises In Shaping Financial Systems From The Global
Financial Crisis To Covid19 Magorzata Iwaniczdrozdowska
https://ebookbell.com/product/the-role-of-crises-in-shaping-financial-
systems-from-the-global-financial-crisis-to-covid19-magorzata-
iwaniczdrozdowska-46219966
The Role Of Crises In Shaping Financial Systems From The Global
Financial Crisis To Covid19 Magorzata Iwaniczdrozdowska
https://ebookbell.com/product/the-role-of-crises-in-shaping-financial-
systems-from-the-global-financial-crisis-to-covid19-magorzata-
iwaniczdrozdowska-46231430
The Role Of The Leastaspected Planet In Astrocartography Planetary
Symbolism In Astrocartography And Transcendental Astrology Rob Couteau
https://ebookbell.com/product/the-role-of-the-leastaspected-planet-in-
astrocartography-planetary-symbolism-in-astrocartography-and-
transcendental-astrology-rob-couteau-46483964
6. THE ROLE OF IoT AND
BLOCKCHAIN
Techniques and Applications
8. THE ROLE OF IoT AND
BLOCKCHAIN
Techniques and Applications
Edited by
Sanjay K. Kuanar, PhD
Brojo Kishore Mishra, PhD
Sheng-Lung Peng, PhD
Daniel D. Dasig, Jr., PhD
10. About the Editors
Sanjay K. Kuanar, PhD
Professor and Head, Computer Science and Engineering
Department, GIET University, Odisha, India
Sanjay K. Kuanar, PhD, is Professor and Head of
Computer Science and Engineering Department of
GIET University, Odisha, India. He has (co)authored
several publications in refereed SCI journals, including
IEEE Transactions on Multimedia, IEEE Transac
tions on Cybernetics, and Elsevier’s Journal of Visual Communication and
Image Representation, for which he has also acted as a reviewer. He has
also participated in many international conferences. His research interests
include computer vision, pattern recognition, machine learning, and multi
media computing. His primary research is focused on exploring different
machine learning techniques for solving several challenging problems
in summarizing and segmenting videos. Dr. Kuanar earned his PhD from
Jadavpur University, Kolkata, his ME (Computer Engineering) degree from
Jadavpur University, and his BTech in Computer Science and Engineering
from Utkal University.
Brojo Kishore Mishra, PhD
Professor, Computer Science and Engineering
Department, GIET University, Gunupur, Odisha,
India
Brojo Kishore Mishra, PhD, is a Professor in the
Computer Science and Engineering Department at
the GIET University, Gunupur, Odisha, India. He has
published more than 32 research papers in national
and international conference proceedings, over 27 research papers in peer-
reviewed journals, over 24 book chapters, two authored books, and four
edited books. His research interests include data mining and big data analysis,
machine learning, and security. He received his PhD degree in Computer
Science from the Berhampur University.
11. vi About the Editors
Sheng-Lung Peng, PhD
Professor, Department of Computer Science and
Information Engineering, National Dong Hwa
University (NDHU), Taiwan
Sheng-Lung Peng, PhD, is a Professor in the Depart
ment of Computer Science and Information Engi
neering at National Dong Hwa University (NDHU),
Taiwan. Dr. Peng has edited several special issues for
journals, such as Soft Computing, Journal of Internet Technology, Journal of
Computers, and MDPI Algorithms. He is also a reviewer for many journals.
He published more than 100 papers in international journals and confer
ences. Dr. Peng is now the Dean of the Library and Information Services
Office of NDHU, an honorary Professor of the Beijing Information Science
and Technology University of China, and a visiting Professor at the Ningxia
Institute of Science and Technology of China. He is also the regional director
of the ACM-ICPC Contest Council for Taiwan, a director of the Institute
of Information and Computing Machinery (IICM), and a director of the
Information Service Association of the Chinese Colleges and of the Taiwan
Association of Cloud Computing (TACC). He is also a supervisor of the
Chinese Information Literacy Association, the Association of Algorithms
and Computation Theory (AACT), and the Interlibrary Cooperation Asso
ciation in Taiwan. He has also served as secretary-general of TACC, AACT,
IICM. His research interests are in designing and analyzing algorithms for
bioinformatics, combinatorics, data mining, and networks.
Daniel D. Dasig, Jr., PhD
Associate Professor, Electrical and Computer
Engineering, De La Salle University, Dasmariñas,
Philippines
Daniel D. Dasig, Jr., PhD, is a Professorial Lecturer
in electrical engineering, environmental engineering,
information technology, computer science, and educa
tion in the Philippines and abroad. He is an Associate
Professor 6 of the Graduate Studies of College of Science and Computer
Studies of De La Salle University Dasmarinas, Philippines, and a Professo
rial Lecturer at the College of Continuing andAdvanced Professional Studies
12. vii
About the Editors
of the University of Makati, where he also served as Research Coordinator
in the College of Computer Science. He served as Chair of Computer Engi
neering Department of Jose Rizal University, Philippines. He also works as
part of the Change Management and software development teams of TELUS,
a Canadian telecommunication company. He is a Lean Six Sigma Certified,
ITIL V3 Certified, and Certified Project Management Expert. Dr. Dasig has
authored and co-authored more than 100 academic and technical papers
extending over a wide spectrum of research areas, such as in engineering,
information technology, education, computer science, and social sciences.
He has authored and co-authored books for higher education and senior high
school programs. He has organized and co-organized local and international
conferences and was a recipient of several awards and fellowships. He
has held executive roles and active membership in more than 40 profes
sional, research, and policymaking organizations, such as ICANN-NCSG,
Internet Society, ICpEP, and PSITE. He has received numerous global and
international awards, including the World Class Filipino for Engineering
and Information Technology. He is an IEEE member of the Republic of the
Philippines Section. He received his BSc in Computer Engineering, MSc in
Engineering in Computer Engineering, and PhD in Electrical and Computer
Engineering degrees.
14. Contributors.....................................................................................................................................xiii
Abbreviations................................................................................................................................... xix
Preface............................................................................................................................................... xxv
PART I: IOT TECHNIQUES AND METHODOLOGIES ................................ 1
1. Data Mining Algorithms for IoT: A Succinct Study.................................... 3
Chandrakanta Mahanty, Brojo Kishore Mishra, and Raghvendra Kumar
2. Information Technology Evolutions in the Manufacturing Sectors: Indus
try 4.0, IoT, and Blockchain........................................................................ 13
Kali Charan Rath, Rakesh Sahu, and Tapas Chhualsingh
3. The Future of Smart Communication: IoT and Augmented Reality:
A Review ....................................................................................................... 29
Debabrata Dansana, S. Gopal Krishna Patro, and Brojo Kishore Mishra
4. Heart Rate Monitoring Using IoT and AI for Aged Person: A Survey... 39
Sibo Prasad Patro, Neelamadhab Padhy, and Rahul Deo Sah
5. BADS-MANET: Black Hole Attack Detection System in
Mobile Networks Using Data Routing Information (DRI) and
Cross-Check Mechanism............................................................................. 61
Chetana Khetmal, Nilesh Bhosale, Umashankar Ghugar, and Bikash Ranjan Bag
6. A Study of Computation Offloading Techniques Used by
Mobile Edge Computing in an IoT Environment ..................................... 73
Devpriya Panda, Brojo Kishore Mishra, and Chhabi Rani Panigrahi
7. AquaTalk: An Intensification of System Influence in Aquaculture......... 87
P. Sudheer Babu and Sanjay Kumar Kuanar
8. A Comprehensive Survey on Mitigation of Challenging Issues in
Green IoT.................................................................................................... 101
Geetanjali Nayak, Neelamadhab Padhy, and Tusar Kanti Mishra
9. Shortest Route Analysis for High-Level Slotting Using Peer-to-Peer ....113
Dileep Kumar Kadali and R. N. V. Jagan Mohan
Contents
15. 10. Internet of Things (IoT) Based on User Command Analysis and
Regulator System ....................................................................................... 123
Harsh Pratap Singh, R. P. Singh, Rashmi Singh, and Bhaskar Singh
11. IoT System with Heterogeneous Servers: Steady-State Solution and
Performance Evaluation............................................................................ 135
P. K. Swain and P. K. Panda
12. IoT-Based Unified Approach to Predict Particulate Matter Pollution in
Thailand...................................................................................................... 145
Ferdin Joe John Joseph
13. An Internet of Things-Based Novel Approach to Rescue Children from
Borewells..................................................................................................... 153
Vikram Puri, Bhuvan Puri, Raghvendra Kumar, and Chung Van Le
PART II: BLOCKCHAIN TECHNIQUES AND METHODOLOGIES ...... 163
14. Blockchain: A New Way to Revolutionize CRM Systems ...................... 165
Tanay Kulkarni, Purnima Mokadam, and Kailas Devadkar
15. Blockchain-Enabled Decentralized Traceability in the
Automotive Supply Chain......................................................................... 177
Sonali Shirish Patwe
16. Understanding the Concept of Blockchain and Its Security.................. 187
Mrinal, Anjana Mishra, and Brojo Kishore Mishra
17. Sentiment Analysis for Prediction of Bitcoin Response.......................... 193
Sudhansu Bala Das and Dipak Das
18. Blockchain Makes Certain Truthfulness of Supervised Predictive
Clinical Trial Data Analysis ...................................................................... 207
D. Anand Kumar and R. N. V. Jagan Mohan
19. Blockchain Can Strengthen the Trustworthiness of Meta-Analysis...... 219
Yugandhar Bokka and R. N. V. Jagan Mohan
20. Query Response Time in Blockchain Using Big Query Optimization .. 229
M. Srikanth and R. N. V. Jagan Mohan
21. Transformative Blockchain Knacks for Bitcoin Cryptocurrency and
Its Impacts .................................................................................................. 237
Bhavani Sankar Panda and Chandan Kumar Giri
22. Blockchain-Based Smart Contract for Transportation of
Blood Bank System .................................................................................... 253
Nihar Ranjan Pradhan, D. Anil Kumar, and Akhilendra Pratap Singh
x Contents
16. 23. Blockchain Traversal: Its Working Aspects and a Brief Discussion on
Its Security.................................................................................................. 267
Anand Kumar Jha, Ritika Raj, Anjana Mishra, and Brojo Kishore Mishra
24. Improved Framework for E-Healthcare Based on Blockchain and
Fog Computing........................................................................................... 275
K. Lakshmi Narayana, S. Priyanga, and K. Sathiyamurthy
25. An IoT and Blockchain-Based System for Acute Security Check and
Analysis....................................................................................................... 285
Adarsh Pratik, Abhishek Bhattacharjee, Rojalina Priyadarshini, and Subham Divakar
26. Limitations of Facial Emotion Recognition Using Deep Learning for
Intelligent Human-Machine Interfaces.................................................... 295
Sabyasachi Tribedi and Ranjit Kumar Barai
PART III: APPLICATION AND CASE STUDIES .........................................311
27. State of the Art of Machine Learning Techniques: A Case Study on
Voting Prediction........................................................................................ 313
Gouri Sankar Nayak, Rasmita Panigrahi, and Neelamadhab Padhy
28. Climate Prediction by Using a Machine Learning Approach:
A Case Study............................................................................................... 325
K. Siva Krishna and Neelamadhab Padhy
29. Data Transmission in Multi-Hop Cluster Using Blockchain in a Clustered
Wireless Sensor Network (CWSN)........................................................... 335
Bandita Sahu, Ranjeet Kumar Panigrahi, and Jemarani Jaypuria
30. An Open-Source Web-Based OWL Ontology Editing and Browsing
Tool: Swoop ................................................................................................ 349
V. B. Narasimha, B. Sujatha, and S. Nagaprasad
31. A Real-World Application Based on Blockchain..................................... 357
Auropremi Aspruha
32. Modified Design of Conformal Circular Patch for 15GHz Application...363
Ribhu Abhusan Panda and Debasis Mishra
33. Cloud-Based Data Analytics: Applications, Security Issues, and
Challenges................................................................................................... 373
Murali Krishna Senapaty, Gitanjali Mishra, and Abhishek Ray
34. ROBIARM: Vision-Based Object Detection System .............................. 391
Vikram Puri, Sandeep Singh Jagdev, Chung Van Le, and Bhuvan Puri
xi
Contents
17. 35. Security Analysis and Fraud Prevention in Cloud Computing ............. 401
Md. Iman Ali, Pranay Jha, Ashok Sharma, and Sukhkirandeep Kaur
36. Prediction of Diseases Through Data Mining.......................................... 419
A. V. S. Pavan Kumar, Venkata Naresh Mandhala, and Debrup Banerjee
37. Naïve Bayes Full-Spectral Image Analytics Using K-Nearest Based
Parzen Window .......................................................................................... 431
R. Rajasekhar and R. N. V. Jagan Mohan
38. Mental Health Disorders and Privacy-Preserving Data Mining:
A Survey...................................................................................................... 441
Vijaya Pinjarkar, Amit Jain, and Anand Bhaskar
39. Industry 4.0 with Big Data Analysis: A Review....................................... 451
K. Murali Gopal
Index.................................................................................................................... 463
xii Contents
18. Contributors
Md. Iman Ali
Research Scholar, School of Computer Application, Lovely Professional University, Phagwara,
Punjab, India, E-mail: mdimanali@gmail.com
Auropremi Aspruha
Integrated Test Range, Defence Research Development Organization (DRDO), Chandipur,
Odisha – 756025, India
P. Sudheer Babu
Department of Computer Science, GIET University, Gunupur, Odisha, India,
E-mail: sudheerpunuri@giet.edu
Bikash Ranjan Bag
Department of Computer Science, Berhampur University, Berhampur – 761006, India,
E-mail: bikashbag@gmail.com
Debrup Banerjee
Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation,
Vaddeswaram, Guntur, Andhra Pradesh, India
Ranjit Kumar Barai
Department of Electrical Engineering, Jadavpur University, Kolkata, West Bengal, India,
E-mail: ranjit.k.barai@gmail.com
Anand Bhaskar
Assistant Professor, Sir Padampat Singhania University, Rajasthan, India,
E-mail: anand.bhaskar@spsu.ac.in
Abhishek Bhattacharjee
Department of IT, C.V. Raman College of Engineering, Bhubaneswar, India,
E-mail: abhishekb496@gmail.com
Nilesh Bhosale
Principal Software Engineer, Credit Vidya, Hyderabad, Telangana, India,
E-mail: nileshxbhosle@gmail.com
Yugandhar Bokka
Research Scholar, GIET University, Gunupur, Odisha, India, E-mail: yug.599@gmail.com
Tapas Chhualsingh
Assistant Professor, Department of EEE, GIETU, Gunupur – 765022, Odisha, India
Debabrata Dansana
Department of Computer Science and Engineering GIET University, Gunupur, Odisha, India,
E-mail: debabratadansana07@gmail.com
Dipak Das
Integrated Test Range, Defence Research Development Organization (DRDO), Chandipur,
Odisha – 756025, India
19. xiv Contributors
Sudhansu Bala Das
Integrated Test Range, Defence Research Development Organization (DRDO), Chandipur,
Odisha – 756025, India
Kailas Devadkar
Department of Information Technology, Sardar Patel Institute of Technology, Mumbai – 400058,
Maharashtra, India
Subham Divakar
Department of ETC, C.V. Raman College of Engineering, Bhubaneswar, India,
E-mail: shubham.divakar@gmail.com
Umashankar Ghugar
Department of Computer Science, Berhampur University, Berhampur – 761006, India,
E-mail: ughugar@gmail.com
Chandan Kumar Giri
Associate Professor, Computer Science and Engineering, CUTM, Paralakhemundi, Odisha, India,
E-mail: chandankumargiri@gmail.com
K. Murali Gopal
Department of Computer Science and Engineering, School of Engineering, GIET University,
Gunupur – 765022, Odisha, India, E-mail: kmgopal@giet.edu
Sandeep Singh Jagdev
Ellen Technology (P), LTD, Jalandhar, Punjab, India
Amit Jain
Assistant Professor, Sir Padampat Singhania University, Rajasthan, India, E-mail: amit.jain@spsu.ac.in
Jemarani Jaypuria
Department of Computer Science, GIET, University, Gunupur, Odisha, India
Anand Kumar Jha
Department of Information Technology, CVRCE, CVRCE, Bhubaneswar, India
Pranay Jha
Research Scholar, School of Computer Application, Lovely Professional University, Phagwara,
Punjab, India, E-mail: pranay1988jha@gmail.com
Ferdin Joe John Joseph
Faculty of Information Technology, Thai-Nichi Institute of Technology, Bangkok, Thailand,
E-mail: ferdin@tni.ac.th
Dileep Kumar Kadali
Research Scholar, Department of CSE, GIET University, GIET University, Gunupur – 765022,
Odisha, India, E-mail: dileepkumarkadali@gmail.com
Sukhkirandeep Kaur
Assistant Professor, School of Computer Science and Engineering, Lovely Professional University,
Phagwara, Punjab, India, E-mail: sukhkirandeep.23328@lpu.co.in
Chetana Khetmal
Department of Computer Science, K.C College of Engineering, Mumbai, Maharashtra, India,
E-mail: khetmalchetna@gmail.com
K. Siva Krishna
Research Scholar, School of Computer Engineering (CSE), GIET University Gunupur, Odisha, India,
E-mail: ksivakrishna@giet.edu
20. xv
Contributors
Sanjay Kumar Kuanar
Department of Computer Science, GIET University, Gunupur, Odisha, India,
E-mail: sanjay.kuanar@giet.edu
Tanay Kulkarni
Department of Information Technology, Sardar Patel Institute of Technology, Mumbai – 400058,
Maharashtra, India, E-mail: tanaykulkarni06@gmail.com
A. V. S. Pavan Kumar
Department of Computer Science and Engineering, GIET University, Gunpur, Odisha, India,
E-mail: avspavankumar@giet.edu
D. Anand Kumar
Research Scholar, GIET University, Gunupur, Odisha, India, E-mail: anand.k.deva@gmail.com
D. Anil Kumar
GIET University, Gunpur, Rayagada, Odisha, India
Raghvendra Kumar
Department of Computer Science and Engineering, LNCT Group of College, Jabalpur, India
Chung Van Le
Duy Tan University, Da Nang, Vietnam
Chandrakanta Mahanty
Department of Computer Science and Engineering, GIET University, Gunupur, Odisha, India
Venkata Naresh Mandhala
Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation,
Vaddeswaram, Guntur, Andhra Pradesh, India, E-mail: mvnaresh.mca@gmail.com
Anjana Mishra
Department of Information Technology, CVRCE, CVRCE, Bhubaneswar, India,
E-mail: anjanamishra2184@gmail.com
Brojo Kishore Mishra
Department of Computer Science and Engineering GIET University, Gunupur, Odisha, India,
E-mail: brojomishra@gmail.com
Debasis Mishra
Department of Electronics and Telecommunication, Veer Surendra Sai University of Technology,
Burla, Odisha – 768018, India
Gitanjali Mishra
Assistant Professor, GIET University, Gunupur, Odisha, India
Tusar Kanti Mishra
Department of CSE, Gayatri Vidya Parishad College of Engineering for Women, Visakhapatnam,
Andhra Pradesh, India, E-mail: tusar.k.mishra@gvpcew.ac.in
R. N. V. Jagan Mohan
Assistant Professor, Department of CSE, Swarnandhra College of Engineering and Technology,
Narasapur – 534280, Andhra Pradesh, India, E-mail: mohanrnvj@gmail.com
Purnima Mokadam
Department of Information Technology, Sardar Patel Institute of Technology, Mumbai – 400058,
Maharashtra, India
Mrinal
Department of Information Technology, CVRCE, CVRCE, Bhubaneswar, India
21. xvi Contributors
S. Nagaprasad
Osmania University, Amberpet, Hyderabad, Telangana – 500007, India
V. B. Narasimha
Osmania University, Amberpet, Hyderabad, Telangana – 500007, India
K. Lakshmi Narayana
PhD Scholar, Department of CSE, Pondicherry Engineering College, Puducherry, India,
E-mail: kodavali.lakshmi@gmail.com
Geetanjali Nayak
Department of CSE, Gayatri Vidya Parishad College of Engineering, Visakhapatnam, Andhra Pradesh,
India, E-mail: geetanjalinayak2019vizag
Gouri Sankar Nayak
MTech Research Scholar, School of Computer Engineering (CSE), GIET University Gunupur, Odisha,
India, E-mail: mr.gouri4u@gmail.com
Neelamadhab Padhy
Associate Professor, School of Computer Engineering (CSE), GIET University Gunupur, Odisha, India,
E-mails: dr.neelamadhab@giet.edu; dr.neelamadhab@gmail.com
Bhavani Sankar Panda
Assistant Professor, Computer Science and Engineering, GIET University, Gunupur, Odisha, India,
E-mail: chintupanda@gmail.com
Devpriya Panda
Department of CSE and IT, GIET University, Gunupur, Odisha, India
P. K. Panda
Department of Computer Application, North Orissa University, Baripada – 757003, Odisha, India,
E-mail: panda3k32003@gmail.com
Ribhu Abhusan Panda
Department of Electronics and Telecommunication, Veer Surendra Sai University of Technology, Burla,
Odisha – 768018, India, E-mail: ribhupanda@gmail.com
Chhabi Rani Panigrahi
Rama Devi Women’s University, Bhubaneswar, India
Ranjeet Kumar Panigrahi
Department of Computer Science, GIET, University, Gunupur, Odisha, India
Rasmita Panigrahi
PhD Research Scholar, School of Computer Engineering (CSE), GIET University Gunupur, Odisha,
India, E-mail: rasmita@giet.edu
S. Gopal Krishna Patro
Department of Computer Science and Engineering GIET University, Gunupur, Odisha, India,
E-mail: sgkpatro2008@gmail.com
Sibo Prasad Patro
Research Scholar, School of Computer Engineering (CSE), GIET University Gunupur, Odisha, India,
E-mail: sibofromgiet@giet.edu
Sonali Shirish Patwe
PhD Research Scholar, Symbiosis International University, Lavale, Pune, India
22. Contributors xvii
Vijaya Pinjarkar
PhD Scholar, Sir Padampat Singhania University, Rajasthan, India, E-mail: vijaya.pinjarkar@spsu.ac.in
Nihar Ranjan Pradhan
Department of Computer Science, National Institute of Technology Meghalaya, Shillong – 793003,
Meghalaya, India, E-mail: niharpradhan@nitm.ac.in
Adarsh Pratik
Department of IT, C.V. Raman College of Engineering, Bhubaneswar, India,
E-mail: adarshpratik.2010@gmail.com
Rojalina Priyadarshini
Department of IT, C.V. Raman College of Engineering, Bhubaneswar, India,
E-mail: priyadarhini.rojalina@gmail.com
S. Priyanga
MTech, Department of CSE, Pondicherry Engineering College, Puducherry, India
Bhuvan Puri
D.A.V Institute of Engineering and Technology, Jalandhar, Punjab, India,
E-mail: bhuvanpuri239@gmail.com
Vikram Puri
Duy Tan University, Da Nang, Vietnam
Ritika Raj
Department of Information Technology, CVRCE, CVRCE, Bhubaneswar, India
R. Rajasekhar
Assistant Professor, Department of CSE, GIET University, Gunupur, Odisha, India, E-mail:
rrajasekhar@giet.edu
Kali Charan Rath
Associate Professor, Department of Mechanical Engineering, GIETU Gunupur – 765022, Odisha, India,
E-mail: kalimtech@gmail.com
Abhishek Ray
Professor, KIIT University, Bhubaneswar, India
Rahul Deo Sah
Dr. Shyama Prasad Mukherjee University Ranchi, India, E-mail: rahuldeosah@gmail.com
Bandita Sahu
Department of Computer Science, GIET, University, Gunupur, Odisha, India
Rakesh Sahu
Assistant Professor, Department of EEE, GIETU, Gunupur – 765022, Odisha, India
K. Sathiyamurthy
Associate Professor, Department of CSE, Pondicherry Engineering College, Puducherry, India
Murali Krishna Senapaty
Assistant Professor, GIET University, Gunupur, Odisha, India
Ashok Sharma
Associate Professor, School of Computer Application, Lovely Professional University, Phagwara,
Punjab, India, E-mail: drashoksharma@hotmail.co.in
23. xviii Contributors
Akhilendra Pratap Singh
Department of Computer Science, National Institute of Technology Meghalaya, Shillong – 793003,
Meghalaya, India
Bhaskar Singh
Radharaman Institute of Science and Technology, Bhopal, Madhya Pradesh, India
Harsh Pratap Singh
Sri Satya Sai University of Technology and Medical Sciences, Sehore, Madhya Pradesh, India,
E-mail: singhharshpratap@gmail.com
R. P. Singh
Sri Satya Sai University of Technology and Medical Sciences, Sehore, Madhya Pradesh, India
Rashmi Singh
Radharaman Institute of Science and Technology, Bhopal, Madhya Pradesh, India
M. Srikanth
Research Scholar, GIET University, Gunupur, Odisha, India, E-mail: srikanth.mandela@gmail.com
B. Sujatha
Osmania University, Amberpet, Hyderabad, Telangana – 500007, India
P. K. Swain
Department of Computer Application, North Orissa University, Baripada – 757003, Odisha, India,
E-mail: prasantanou@gmail.com
Sabyasachi Tribedi
Department of Electrical Engineering, Jadavpur University, Kolkata, West Bengal, India,
E-mail: stribedi15@gmail.com
24. Abbreviations
ABE attribute-based-encryption
ADHD attention deficit hyperactivity disorder
AI artificial intelligence
ANFIS adaptive neuro-fuzzy inference system
ANN artificial neural network
ARM architecture reference model
AWS Amazon web services
BAN body area network
BCG ballistocardiogram
BDA big data analytics
BETaaS building the environment for the things as a service
BN belief network
BPM body pulse rate
BS base station
BVS beneath video system
CAD coronary artery disease
CAMI Caribbean agro meteorological initiative
CC climate change
CC cloud computing
CCI cloud computing infrastructure
CCTV closed camera television
CdS cadmium sulfide
CH cluster head
CHD coronary heart disorder
CHMM canny house monitor and manager
CII critical information infrastructure
CNN convolutional neural network
CO2
carbon dioxide
CO3
2–
carbonates
CP-ABE ciphertext-policy attribute-based encryption
CPS cyber-physical systems
CRM customer relationship management
CSP cloud service provider
25. xx Abbreviations
DA data analysis
DAaaS data analytics-as-a-service
DAIaaS data analytics infrastructure as a service
DAPaaS data analytics platform as a service
DASaaS data analytics software as a service
DB database
DC data center
DC-RBAC data-centric RBAC
DDD data-driven decision
DML data manipulation language
DO dissolved oxygen
DOB date of birth
DPAE demographic profiles based attribute encryption
DPBSV dynamic prime number based security verification
DRI data routing information
DRLO deep, reinforcement, learning, and offloading
DT DRI table
DTMF dual tone multi frequency
EC electrical conductivity
EDs electronic devices
EESCDE energy efficient SNR-based clustering in UWSN with data
encryption
EH energy harvesting
EHRs electronic health records
EPs emotional profiles
FCFS first come first serve
FCL fully connected layer
FER facial emotion recognition
FTMH fault tolerant multi-hop clustering
GAHA green IoT agriculture and healthcare applications
GCP Google cloud platform
GFLOPS Giga FLOPS
GHQ general health questionnaire
GIG grayscale Image generation
GPIO general-purpose input-output
GPS global positioning system
GPUs graphical processor units
HAN home area network
HDFS Hadoop distributed file system
26. xxi
Abbreviations
HFSS high frequency structure simulator
HGPCA hierarchical GA and PSO-based computation algorithm
HMS health monitoring system
HR humanoid robots
IaaS infrastructure as a service
IHD ischemic heart disease
IIG integral image generation
IIoE industry internet of everything
IN inspector node
IoT internet of things
IP interest points
IPD interest point detection
IR infra-red
ISP internet service provider
KDD knowledge discovery in databases
KNX Konnex
LANs local area networks
LDL low density lipoprotein
LDR light dependent resistor
M2M machine to machine
MANET mobile ad-hoc network
MBS macro base station
MCC mobile cloud computing
MCC multi-class classifier
MDDSS medical diagnostic choice aid structures
MEC mobile edge computing
MECO mobile edge computation offloading
MIC many integrated core
MK master-secret key
ML machine learning
MLP multi-layer perceptron
MVC model-view-controller
NAN neighborhood area network
NBDT Naïve Bayesian and decision tree
NCH non cluster head
NLP natural language processing
NN neural network
NO2
nitrates
NRL normalized routing load
27. xxii Abbreviations
NS2 network simulator 2
OCR optical character recognition
OFDMA orthogonal frequency-division multiple access
OKBC open knowledge base connectivity
OpenCV open source computer vision
OS operating system
OT operational technology
P2P peer to peer
PaaS platform as a service
PAN personal area network
PCA major component analysis
PCI peripheral communication interface
PDD pervasive developmental disorder
PDPR packet dropping ratio
PDR packet delivery ratio
PF final prediction
PHM prognostic health monitoring
PICO population, intervention, comparison, and outcome
PIR passive infra-red
PK public-key
PM particulate matter
PPDM privacy preserving data mining
PWM pulse width modulation
QoE quality of experience
QoS quality of service
RBAC role-based access control
RCPSP resource-constrained project scheduling problem
RDD resilient distributed datasets
RF random forest
RFID radio frequency identification
RGM response generation matrix
RL reinforcement learning
RLO reinforcement learning optimization
RMSE root mean square error
RREP route reply
RREQ route request
RT response time
SaaS software as a service
SCH sub cluster head
28. Abbreviations xxiii
SDN software-defined networking
SDT selective data transmission
SDTO software defined task offloading
SK secret-key
SNAPP social networks adapting pedagogical practice
SNR signal-to noise ratio
SOA service oriented architecture
SoC system on chip
SOM self-organizing map
SQL structural query language
SSS safe, scalable, and secure
SVM support vector machine
SWOOP semantic web ontology overview and perusal
TDMA time-division multiple access
TDS total dissolved solids
TDT time space transmission
VM virtual machine
VSWR voltage standing wave ratio
WHO World Health Organization
WPAN wireless personal area network
WSN wireless sensor network
30. Preface
Blockchain technology is receiving growing attention from various orga
nizations and researchers as it provides magical solutions to the problems
associated with the classical centralized architecture. Blockchain, whether
public or private, is a distributed ledger with the capability of maintaining
the integrity of transactions by decentralizing the ledger among participating
users.
On the other hand, the Internet of Things (IoT) represents a revolution of
the Internet that can connect nearly all environment devices over the Internet
to share their data to create novel services and applications for improving
our quality of life. Although the centralized IoT system provides countless
benefits, it raises several challenges. Resolving these challenges can be done
by integrating IoT with blockchain technology.
The Department of Computer Science and Engineering at the GIET
University has organized the AICTE sponsored international conference on
Recent Trends in IoT and Blockchain (ICRTIB-2019) during 19–20 October,
2019.
The current book provides an overview of IoT and blockchain concepts,
IoT solutions with blockchain in the current business scenario, and much
more.
34. CHAPTER 1
Data Mining Algorithms for IoT:
A Succinct Study
CHANDRAKANTA MAHANTY,1
BROJO KISHORE MISHRA,1
and
RAGHVENDRA KUMAR2
1
Department of Computer Science and Engineering, GIET University,
Gunupur, Odisha, India
2
Department of Computer Science and Engineering, LNCT College,
Jabalpur, India
ABSTRACT
IoT is a fresh idea which enables people to connect different sensors and
intelligent machines to gather information from the surroundings in real
time. It is anticipated that the number of effective IoT machines will increase
to 0.01 trillion and 0.022 trillion by 2020 and 2025, respectively. Lots
of analytical techniques are brought into IoT to render IoT smarter; data
mining is among the most precious techniques. Data mining is the method
of finding interesting knowledge and possibly relevant patterns from big
data sets and using algorithms to extract crucial information. This article
focuses on data mining framework for IoT, data mining functionalities and
usage of data mining in IoT applications. After that, a survey on different
data mining algorithms is presented. We also analyze the effectiveness and
efficiency of different data mining algorithms (K-nearest neighbors, Naïve
Bayes, support vector machine (SVM), C5.0, deep learning artificial neural
networks (ANN), and ANNs). We reviewed the above mentioned algorithms
and concluded that DLANNs, ANNs, C5.0 give relatively higher accuracy
and memory-efficient as compared to other algorithms. To address IoT data
mining problems such as managing large quantities of information, data
analysis (DA), a big data mining system is suggested.
35. 4 The Role of IoT and Blockchain: Techniques and Applications
1.1 INTRODUCTION
Internet of things (IoT) relates to the next stage of the internet, containing
hundreds of billions of nodes covering different elements from tiny ubiq
uitous sensor systems and portable equipments to big web servers and
supercomputer clusters [1]. IoT operates with linking the entire world’s stuff
via the internet [2]. IoT incorporates fresh computing and communications
systems (wireless communications systems, radio frequency identification
(RFID) technologies, actuators, and sensors) and develops the next genera
tion of internet [3]. Several scientists who work in multiple areas such as
scholars, institutes, and departments of government gave a lot of importance
in changing the today’s internet by developing multiple technologies such as
smart city, smart transportation, smart healthcare [4], smart home, and smart
agriculture. IoT gets and stores a lot of information from sensors, wearables,
smartphones, and other devices that are activated on the internet. In order
to convert information into implementable information, it must be assessed
utilizing suitable data mining techniques. Sensor information from a smart
home, for example, is used for safety surveillance or home automation for
elderly or disabled individuals, or traffic data is evaluated to determine an
optimal ambulance path. The information gathered from IoT systems is
being utilized for comprehend and supervise complicated environments
within us, providing better decision-making, higher accuracy, effectiveness,
and productivity. Analysis of the produced information must be recorded
effectively in order to make this choice more precise and processing the
same needs techniques. Data mining is among the most helpful techniques.
Datasets store the information produced from IoT devices. The big volume
of information processed using data mining technique estimates the model,
generalizing it to fresh information as well. Data mining is therefore the
method of finding precious data from bulk quantities of information stored
in databases (DB) and data warehouses.
1.2 DATA MINING FOR IOT
Data mining in IoT is used to handle the big volume of information that IoT
devices collect. Data mining includes discovering and analyzing informa
tion from the huge information set. Data mining’s primary aim is to explore
helpful patterns from big knowledge set obtained from machines, sensors,
IoT devices [5]. Discovery of knowledge, analysis of patterns and collection
36. 5
Data Mining Algorithms for IoT: A Succinct Study
of data are the words used in the IoT for data mining. Data mining’s main
goal is to create an effective and concise framework that is suited to the
knowledge set. Thus, a number of researches focus on the use or develop
ment of efficient IoT data mining techniques. The findings outlined in [6]
indicate that it is possible to utilize data mining algorithms to create IoT
smarter which could provide better services. Based on prior information, a
DM method could also be used to create a choice that let us tell the sale of a
specific product, as example, cold drink sales higher in summer as compared
to winter [7].
Data mining converts a set of data into a comprehensible framework and
incorporates significant information that helps to gain insight into the raw
data gathered from different IoT apps. IoT thus forms a network of devices
that implanted with sensor, electronics, and network connectivity through
which devices can gather and exchange information. The ideal combination
of IoT and data mining leads to an innovative technology that benefits every
part of the population. We were inspired to evaluate a data mining structure
for IoT apps by the enormous quantity of data produced by IoT apps and
knowledge discovery in databases (KDD). The IoT data mining framework
is shown below by considering data mining for IoT.
Data mining is primarily divided into two procedures. First procedure
is descriptive and the second procedure is predictive. Data mining is repre
sented in a short and aggregated manner called descriptive data mining and
it provides important overall information. In predictive information mining,
information is evaluated in a series to build one or more information frame
works to estimate the actions of freshly created information sets [8] utilizing
methods such as classification, clustering, regression, and trend analysis. In
the course of knowledge discovery, data mining can be seen as an important
technique. The stages which are required for this method depicted as below:
• Stage 1: Cleaning of Data: Noise and inconsistent information will
be deleted in this process.
• Stage 2: Data Integration: It brings various sources of information.
• Stage 3: Selection of Data: In this level important information is
recovered that is important to the method of evaluation.
• Stage 4: Data Transformation of Data: Aggregation activities is
conducted in this stage in order to convert or enhance information
into adequate knowledge for data extraction.
• Stage 5: Data Mining: Using smart techniques, the required infor
mation and patterns are obtained in this phase.
37. 6 The Role of IoT and Blockchain: Techniques and Applications
• Stage 6: Evaluation of Patterns: Exploration of interesting patterns
which depict expertise based on certain pleasant procedures.
• Stage 7: Knowledge Presentation: Using visualization and informa
tion depiction methods, information is provided to the customer in
this phase (Figure 1.1).
FIGURE 1.1 Data mining framework for IoT.
1.2.1 DATA MINING FUNCTIONALITIES
1. Classification allocates objects to target types or classes in a set. Its
objective is to forecast the target class correctly in the information
for each situation.
2. Clustering identifies clusters of comparable information objects and
forms a cluster group.
3. Association assessment is the identification of membership rules that
exhibit circumstances of object-value that often happen in a specified
set of information.
4. Time series assessment includes techniques and tools for the assess
ment of time series data to obtain reliable data and other information
features.
5. Outer assessment defines and models conceptual frameworks or
patterns for objects whose conduct evolves over time.
1.2.2 IOT APPLICATIONS BASED ON DATA MINING [9]
1. Health Care: The development of the healthcare sector is apparent
owing to the use and advances of IoT technologies. IoT technolo
gies provide countless facilities to their consumers regarding their
health like weight monitoring equipment, blood sugar levels, heart
rate, and blood pressure information and stored it on a cloud-based
system. To incorporate the above diverse information and provide
precise patient information, a smart system must be evolved. The
38. 7
Data Mining Algorithms for IoT: A Succinct Study
information can be extracted from text using particular prescription
medications and medical records of the patient doctor and from this;
we can derive significant findings about the patient’s current situa
tion and the patient’s survival chances. Clustering method is used to
improve the patient’s therapy and care. Outlier assessment may also
be performed to recognize any uncommon trends that will be simple
to detect any falsification.
2. Home Automation: Several IoT systems are used in the home auto
mation scheme. The sensors used in IoT systems generate valuable
information and patterns. The above crucial information and patterns
are utilized to forecast forthcoming occurrences which will provide
the consumer with effective automated communication. Data mining
utilizes time series and classification analysis functionalities for smart
home. Classification is being utilized by categorizing associated equip
ments which are strongly related and dependent on their use.Time series
assessment is used for information that is produced by these instruments
with their respective time stamps and can be forecast utilizing linear
regression for a specific time using this future occurrence.
3. In Controlling Traffic: The traffic control systems based on IoT are
global positioning system (GPS), smartphones, car sensors disposed
throughout the town can produce information features like accident-
prone zones, light car and heavy car occurrences and approximate
driving time to a particular destination. The classification algorithm
can be used in this situation to fix the issue of traffic jams. Depending
on the elevated, medium, low chance of traffic jam occurrence in a
specific region, selected regions can be grouped. After applying clas
sification algorithm a novel classified framework is developed. This
framework can be utilized to forecast the future time where more
traffic jams occurred. According to the above forecast, the vehicle
can pick the alternate path to reach the targeted station so that over
crowding issues will be prevented.
4. Detection of Pipeline Leakage: Maintaining leaks from water pipes
for municipality is a very complicated task. Sensors will be utilized to
analyze the noise of water that crosses via the tube using data mining
methods, particularly by using the outdated tubes. To detect leaks in
the tubes, the outlier detection algorithm is used. By applying this
methodology in pipeline leakage, testing tasks can be simplified to
detect water leaks and maintenance costs can be lowered to half as
opposed to standard testing methods.
39. 8 The Role of IoT and Blockchain: Techniques and Applications
1.3 DATA MINING ALGORITHMS
1. Support Vector Machines (SVMs): It is a supervised learning para
digm focused on the concept of statistical learning. It is also related
with learning algorithms that analyze information and acknowledge
patterns. Usage of SVM is expanded from classification to regres
sion. In market basket analysis, text classification [10] and acknowl
edgment of patterns in detecting diseases SVM method is used. This
method is also suitable for complicated and noisy domains. Initially,
SVM was intended to tackle the tradeoff, overfitting, and capability
regulation of bias fluctuation.
2. K-Nearest-Neighbor (KNN): It is a voting algorithm as it uses sample
points in terms of a given distance, measure to persuade the categories
of information points being considered. KNN is also used efficiently
for the identification of intrusion for multiple activities in wireless
sensor networks (WSN) and IoT domains [11]. KNN is robust to noisy
training data and is efficient when there are big training data.
3. Naïve Bayes Classifier: Purpose of Naïve Bayes is to build a policy
that adds new items to the class. It provides Bayesian networks
which are aligned with acyclic graphs and the nodes serve arbitrary
variables. Edges are conditional dependencies; unconnected nodes
are variables that are conditionally isolated from one another. These
classifiers have a lot of power based on Bayesian networks, such as
model interpretability and fitting to complicated contexts of infor
mation and classification issues. NB is a straightforward and robust
classifier such as KNN. It derives the probability.
4. C5.0: It provides more precise and effective results among all these
classifiers. C5 is a classifier that compares information to other
classifiers with less time. Memory utilization is minimal in order
to generate a decision tree and it also improves the precision. C5.0
algorithm offers selection of features, cross validation and decreased
equipment for trimming errors. Quinlan subsequently created C5.0
which is the updated version of C4.5. C5.0 version is used to handle
boosting and weighting [12].
5. Artificial Neural Network (ANN): These are focused on the imitation
of the human brain neural system. These are highly effective in solving
data mining duties with higher accuracy. ANNs are complicated and
a large quantity of information processing is needed to solve a greater
accuracy issue. Revolutionary learning algorithms which are focused
on deep learning are further extensions of ANNs [13].
40. 9
Data Mining Algorithms for IoT: A Succinct Study
6. Deep Learning Artificial Neural Networks (DLANNs): These
have an excessive capacity to learn and process huge data and
deliver highly precise findings that other traditional machine and
data mining algorithms cannot achieve. Deep learning can provide
us with innovative ideas on IoT information that other data mining
algorithms do not allow [14].
1.4 COMPARISON OF DIFFERENT DATA MINING ALGORITHMS
All the mentioned data mining algorithms are implemented in the R language.
We use machine learning (ML) repository dataset [15]. We preprocess the
data at first and make it appropriate for the classifier. We can understand the
complete amount of instances correctly and incorrectly categorized with the
aid of confusion matrix [16]. Comparisons of different data mining algo
rithms are depicted in Figure 1.2.
FIGURE 1.2 Classification accuracy and elapsed time for different algorithms (KNN,
SVM, NB, ANN, C5.0, and DLANN).
ANN, C5.0, and DLANNs are having higher accuracy as compared to
other algorithms. By rising the ages, hidden layers and neurons, classifica
tion accuracy could be accomplished. Because of complicated design, the
DLANN algorithm has the largest runtime. A great deal of system resources
are needed for DLANNs.
1.5 SUGGESTED BIG DATA FRAMEWORK FOR IOT
We recommend five layers of IoT and big data mining architecture which is
illustrated in Figure 1.3:
41. 10 The Role of IoT and Blockchain: Techniques and Applications
1. Devices: IoT equipments (cameras, sensors, RFIDs, mobile phones,
and smart devices) are coordinated into IoT frameworks.
2. Raw Data: IoT devices generate data, which can be integrated into
the big data mining system, in different forms, such as structured,
unstructured, and semi-structured data.
3. Data Gather: Data generated to produce clusters for storage and
retrieval. Batch and real-time information can be endorsed and all
information can be analyzed, combined, and reviewed.
4. Processing of Data: MapReduce, Hadoop, Storm, HDFS, and Oozie
techniques are integrated for data processing.
5. Service: All data mining functions have come under this layer.
6. Security and Privacy: This safeguard information is carried against
unauthorized access and confidentiality.
FIGURE 1.3 Big data mining architecture for IoT.
1.6 CONCLUSION
The idea of IoT emerges from a commitment to handle, automate, and
discover all the world’s smart devices, machines, actuators, auto-computing
devices, and sensors. To make choices for both end-user and IoT devices,
it is necessary to integrate data mining technique that supports strategy-
making and system enhancement. Data mining includes the discovery of
novel, exciting, and possibly helpful data patterns and the use of algorithms
to obtain hidden information. It is a difficult job in information mining to
collect this hidden insight from IoT data. In order to manage enormous IoT
info, data mining algorithms are required. This article focuses on IoT data
42. 11
Data Mining Algorithms for IoT: A Succinct Study
mining structure, data mining features, and data mining utilization in IoT
apps. We also investigated the applicability of some data mining algorithms
and found that, compared to other algorithms, DLANNS, ANN, and C5.0
can offer comparatively greater precision findings. This article discusses
learning perspective implementation for IoT data mining, layers linked to
IoT mining, and summary of IoT big data analytics (BDA). Big data mining
mechanism is suggested to address the problems of IoT data mining.
KEYWORDS
• artificial neural networks
• big data mining system
• data mining algorithms
• internet of things
• radio frequency identification
• raw data
REFERENCES
1. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M., (2013). Internet of things (IoT):
A vision, architectural elements, and future directions. Future Generation Computer
Systems, 29(7), 1645–1660.
2. Chen, F., Deng, P., Wan, J., Zhang, D., Vasilakos, A. V., & Rong, X., (2015). Data mining
for the internet of things: Literature review and challenges. International Journal of
Distributed Sensor Networks, 11(8), 431047.
3. Tsai, C. W., Lai, C. F., Chiang, M. C., & Yang, L. T., (2013). Data mining for internet of
things: A survey. IEEE Communications Surveys and Tutorials, 16(1), 77–97.
4. Chen, H., Chung, W., Xu, J. J., Wang, G., Qin, Y., & Chau, M., (2004). Crime data
mining: A general framework and some examples. Computer, 4, 50–56.
5. Shobanadevi, A., & Maragatham, G., (2017). Data mining techniques for IoT and big
data: A survey. In: 2017 International Conference on Intelligent Sustainable Systems
(ICISS) (pp. 607–610). IEEE.
6. Ragavi, R., Srinithi, B., & Sofia, A., (2018). Data mining issues and challenges:A review.
IJARCCE, 7, 118–121. doi: 10.17148/IJARCCE.2018.71125.
7. Batra, I., & Verma, S., (2018). Performance analysis of data mining techniques in IoT. In:
2018 4th
International Conference on Computing Sciences (ICCS) (pp. 194–199). IEEE.
8. Meghana, D., & Akarte, S. P., (2014). Predictive data mining: A generalized approach.
International Journal of Computer Science and Mobile Computing, 3(1), 519–525.
9. Tapedia, K., & Wagh, A. M., (2016). Data mining for various internets of things
applications. International Journal of Research in Advent Technology.
43. 12 The Role of IoT and Blockchain: Techniques and Applications
10. Burges, C. J., (1998). A tutorial on support vector machines for pattern recognition. Data
Mining and Knowledge Discovery, 2(2), 121–167.
11. Yang, X. S., (2019). Introduction to Algorithms for Data Mining and Machine Learning.
Academic Press.
12. Hssina, B., Merbouha, A., Ezzikouri, H., & Erritali, M., (2014). A comparative study of
decision tree ID3 and C4. 5. International Journal of Advanced Computer Science and
Applications, 4(2).
13. Mishra, M., & Srivastava, M., (2014). A view of artificial neural network. In: 2014
International Conference on Advances in Engineering and Technology Research
(ICAETR-2014) (pp. 1–3). Unnao. doi: 10.1109/ICAETR.2014.7012785.
14. Schmidhuber, J., (2015). Deep learning in neural networks: An overview. Neural
Networks, 61, 85–117.
15. Lichman, M., (2013). UCI Machine Learning Repository. Irvine, CA: University of
California, School of Information, and Computer Science. http://archive.ics.uci.edu/ml
(accessed 20 July 2020).
16. Alam, F., Mehmood, R., Katib, I., & Albeshri, A., (2016). Analysis of eight data mining
algorithms for smarter internet of things (IoT). Procedia Computer Science, 98, 437–442.
44. CHAPTER 2
Information Technology Evolutions in
the Manufacturing Sectors: Industry 4.0,
IoT, and Blockchain
KALI CHARAN RATH,1
RAKESH SAHU,2
and TAPAS CHHUALSINGH2
1
Associate Professor, Department of Mechanical Engineering,
GIETU Gunupur – 765022, Odisha, India, E-mail: kalimtech@gmail.com
2
Assistant Professor, Department of EEE, GIETU, Gunupur – 765022,
Odisha, India
ABSTRACT
Manufacturing is an important contributor to productivity, innovation, and
trade. Technological revolution occurred with the change in time. After
passing some revolution, today’s industry handshake is with Industry 4.0.
Industry 4.0 is a rising period of network and collaboration among parts,
machines, and people that can possibly make huge creation and proficiency
profits, upgrades in the personal satisfaction and maintainable natural results.
India is now rolling with digitalization and it has been seen its important
and attractive growth market. Innovation is one of numerous components
making makers reevaluate the manner in which they work. Computerization,
apply autonomy, and the usage of cutting edge fabricating strategies have
drastically changed the industrial facility floor and the assembling forms that
happen there. This study provides an introduction to Industry 4.0 with the help
of the cyber manufacturing system in association with IoT and blockchain.
2.1 INTRODUCTION
Manufacturing is the way of transforming various kinds of raw materials to
final product and can be sold in the commercial center. Each physical item
45. 14 The Role of IoT and Blockchain: Techniques and Applications
that one can purchase in a store or online is produced in some other place.
Today, innovation is making the nation’s economy move towards offering
administrations rather than creating merchandise. Nonetheless, it is ending
up clear to financial experts that a solid assembling industry is one of the
trademark pointers of a sound, flourishing economy.
Producers’ supply chains are modern, complex associations with various
subtleties that can make straightforwardness and responsibility testing,
particularly with regards to the co-ordinations of structure and sending new
hardware and administration parts.
In an industry that computerizes things to help mankind, IT makes the
assembling procedure not so much bulky but rather more mechanized. IT
helps radically in conveying in the nick of time experiences, quick perceiv
ability and consistent advancement for executing new age arrangements.
Makers need to push their industry further and more distant as far as intricate
schedules particularly, specially make and make-to-stock procedures so they
can convey items on a design to-arrange necessity advertise.
Countering supply chain multifaceted nature is significant since the
conventional production system is presently not being used. The profoundly
mind-boggling supply chains are consequently loaded with issues, which
provoked the requirement for effective administration and enhancement.
The fourth industrial revolution will be established on trusted networks
that remove the need for middlemen. Simple processes that are currently
tackled manually or in a segregated manner will be undertaken in an inte
grated way using digital, autonomous systems, underpinned in many cases
by blockchain technology.
Extended number of model ventures with shorter between times drive
the necessities for generation. The ability to reproduce manufacture growth
thusly ends up being logically notable [1]. Potential zones for usage of IoT,
Industry 4.0 in modern mechanization segment to satisfy the worldwide
need is accessible in different businesses. The impact and the system of
improvement is examined and proposed different strategies for the fourth era
industrial revolution [2]. IoT based system can be best implemented and the
data can be well assessed by user whereas the technology behind the block-
chain can be implemented to provide the security and to keep away from
the centralized system which avoids a common data sharing with others and
improves security [3]. The applied structure takes into consideration multi
move activity dependent on security encryption and information obtaining
that gives a security certification, various activity, unwavering quality, and
classification for execution upgrade in a framework [4]. Technological
46. 15
Information Technology Evolutions in the Manufacturing Sectors
methodology supported by the horticultural and agricultural division on
finding the issue, giving feasible, moderate, security, and adequate nourish
ment, feed, fiber, and fuel to purchasers, it is basic to guarantee these worth
chains running easily and effectively by applying propelled web advances
[5]. Multi-criteria examination is utilized by the blockchain innovation to
assess and control the conceptual information for a synthetic industry and
the models are altered for the business integrated with industry 4.0 [6].
Blockchains guarantee straightforward companion investigated works and
activities in the vitality part in recognizing the specialized difficulties can
illuminate for that application just as its potential downsides, and mechanical
undertakings and new companies that are right now applying blockchain
innovation to that zone [7].
Fundamental executions in assembling have likewise developed with
regards to decentralizing 3D printing asset accessibility and in rethinking
how information combination crosswise over assembling supply chains are
actualized [8].
The expansion of IoT and selection of industrial internet undertakings has
allowed security experts the chance to assess the new dangers and vulner
abilities that are being brought into associations around the globe. IoT and
cybersecurity cross with various existing security disciplines. These orders
include: (1) information technology (IT security) for ensuring data frame
works; (2) physical security to secure structures, workplaces, offices, and
so forth; and (3) operational technology (OT) security to ensure operational
frameworks for plant computerization and natural observing frameworks.
Verifying IoT conditions will require drawing from every one of these three
orders. The mix of the components can be depicted as computerized security.
The internet of things (IoT), particularly the modern IoT (IIoT), has
quickly created and is getting a great deal of consideration in scholastic
regions and industry, yet IoT protection dangers and security vulnerabilities
are rising up out of absence of central security innovation. The blockchain
procedure, because of its decentralization and data acknowledgment, was
proposed as a decentralized and disseminated way to deal with assurance
security prerequisites and rouse the improvement of the IoT and IIoT.
IoT based industrial research work is a hot cake in the research field.
Cyber manufacturing is a challengeable area for software engineers and IT
sectors to provide a challengeable security with smooth function of industry
to put the customer satisfaction in an excellent manner.
This chapter provides a prologue to Industry 4.0 with the assistance of
cyber manufacturing system in relationship with IoT and blockchain.
47. 16 The Role of IoT and Blockchain: Techniques and Applications
2.2 CYBER MANUFACTURING
Cyber manufacturing is an idea gotten from digital (cyber) physical frame
works (CPS) that alludes to a cutting edge fabricating framework that offers
a data straightforward condition to encourage resource the executives, give
reconfigurability, and look after efficiency.
The possibility of digital assembling originates from the way that
internet-empowered administrations have included business esteem in
financial parts, for example, retail, music, purchaser items, transportation,
consumer products and medicinal services, etc. In any case, contrasted with
existing internet-empowered parts, producing resources are less associated
and less open progressively. In action the executives because of absence of
linkage between manufacturing plants, conceivable overload in extra part
stock, just as startling machine personal time. Such circumstance calls for
network between machines as an establishment and examination over that
as a need to make an interpretation of simple information into data that
really encourages client basic leadership. Expected functionalities of cyber
manufacturing frameworks incorporate machine network and information
securing, machine wellbeing prognostics and assembling reconfigurability.
2.2.1 CYBER MANUFACTURING ASSOCIATED WITH INDUSTRY 4.0
Assembling industry has been in a consistent battle to deliver excellent prod
ucts at the rate that customer’s request. The mechanical time has enabled
machines to determine the amount issue of assembling by IT framework
through digital assembling. Digital assembling based on: simultaneous
designing, disseminated fabricating, light-footed assembling, virtual assem
bling, virtual undertaking, digital/electronic business, web empowered
CAD/CAM/PDM.
In cyber manufacturing, it is imagined that we will have fast appointing
and decommissioning of framework components, which means critical time
and cost will should be put into verifying trust in an arranged condition
spreading over different business associations.
Cyber manufacturing (Figure 2.1) condition, the thought of arranged
associations and machines makes an open door for item plans to be quickly
created and afterward made with constrained human intercession through
reuse of PC produced code or through programmed compilers that make an
interpretation of structure information to machine guidelines.
48. 17
Information Technology Evolutions in the Manufacturing Sectors
FIGURE 2.1 Cyber-physical interface.
Quite a bit of this anticipated development is predicated on the utilization
of IoT advancements, combined with distributed computing, information
investigation,AI. In this, it is IoTthat gives the extension between the comput
erized space, including new scientific techniques, and the physical area of
the plant and inside the store network. This adjusts well to the Industry 4.0
vision of changing the supply chains into a keen system with good judgment
and self-governing items that impart and interface with one another continu
ously. Especially as Industry 4.0 will involve the interlinkages of different
specialized orders with minimal past association, for example, mechanical
designing with data and interchanges innovation through information and
communication technology.
System based correspondence for Industry 4.0 involves all innovations,
systems, and conventions required technologies, networks, and protocols
required to facilitate a communication relationship in the manufacturing
network system.
2.2.2 CYBER MANUFACTURING PYRAMID
Cyber manufacturing is a noteworthy innovative technological part in the
worldwide development on open manufacturing system. As digitalization
49. 18 The Role of IoT and Blockchain: Techniques and Applications
have taken a significant and alluring development showcase, So, it is excep
tionally fundamental requirement for the assembling ventures to make
reconciliation of information technologies with items, frameworks, arrange
ments, and administrations over the total worth chain extending from design
structure to production to the supportable maintenance.
In today’s world, developments that incorporate IoT, 3D printing,
man-made brainpower (AI), driverless vehicles, hereditary building,
apply autonomy and savvy machines, drives us into the Fourth Industrial
Revolution, or Industry 4.0. Another specialized development is bitcoins
and its hidden blockchain innovation. Blockchains are viewed as the
core of the Industry 4.0 where bitcoins enables a huge number of savvy
gadgets to perform straightforward and frictionless budgetary exchanges,
without human mediation however completely self-sufficient, in the IoT
universe.
From the beginning of time, the assembling business has been in a
consistent battle to create fantastic products at the rate that purchasers request
them. While the mechanical time has enabled machines to determine the
amount issue of assembling, it has prompted a flood of inferior low-quality
merchandise. The new thought was found through cyber manufacturing.
This idea exploits the progressions in data innovation, applying these plans
to the assembling procedure. With a cyber manufacturing model, prescient
investigation advancements will help organizations with operational choices
by finding and featuring potential issues or changes in machine wellbeing
and execution. By and large, this arrangement of cyber manufacturing will
give ongoing linkage between the status of an organization’s plants, current
stock status, and conveyance framework through a progressive “cloud-based
administration.”
Cyber manufacturing has certain levels in its system, like: manufacturing
resource, connection level, conversion level, cyber level, cognition level,
and configuration level as shown in Figure 2.2.
The cyber manufacturing system uses ongoing improvements in IoT,
distributed computing, haze figuring, administration arranged innovations,
among others.Assembling assets and capacities can be exemplified, enrolled,
and associated with one another legitimately or through the internet, in this
manner empowering astute practices of assembling segments and frame
works, for example, self-awareness, self-expectation, self-advancement, and
self-setup.
50. 19
Information Technology Evolutions in the Manufacturing Sectors
FIGURE 2.2 Cyber manufacturing pyramid.
2.3 IOT, BLOCKCHAIN, AND INDUSTRY-4.0
Today’s world advancement is incorporate with IoT, 3D printing, computer
ized reasoning (AI), driverless vehicles, hereditary designing, mechanical
autonomy and savvy machines, drives us into the Fourth Industrial Revolu
tion, or Industry 4.0. Another specialized advancement is bitcoins and its
hidden blockchain innovation. Blockchains are viewed as the core of the
Industry 4.0 where bitcoins enables a huge number of shrewd gadgets to
perform straightforward and frictionless money related exchanges, without
human intercession yet completely self-sufficient, in the IoT universe.
IoT must be viewed as a series of advancements that have customarily
not been associated and will presently be associated with an IP-based
system. These advances are the most significant drivers of the computerized
development. In the focal point of the institutionalization is the supposed
“machine-to-machine” (M2M) correspondence.
IoT for corporate/mechanical use is an arrangement of incorporated
PC organizes and associated modern offices with implicit sensors and
programming for information accumulation and trade with the chance of
51. 20 The Role of IoT and Blockchain: Techniques and Applications
computerized remote control and the executives without human intercession.
The accompanying highlights describe the use of IoT are:
1. Generation of enormous information streams;
2. Multilevel information stockpiling;
3. Real-time preparing;
4. Big data analytics (BDA);
5. Forecasting;
6. Control and the executives.
In the event that all definitions are decreased to one shared factor, IoT
just signifies: “the systems administration of articles which have the avail
ability that empowers them to discuss freely with each other by means of
the internet.” The items are associated with a cloud-put together server with
respect to which the information is accumulated, connected, and examined.
For a model, being the “mind” of the machine, CNC assumes a key job
in this: CNC gives significant creation information to improving generation
groupings, just as machine status information for prescient upkeep of the
machine.
The IoT is the thing that empowers articles and machines, for example,
cell phones and sensors to “impart” with one another just as individuals to
work out arrangements. The mix of such innovation enables items to work
and take care of issues freely. The compelling advancement and usage of IoT
will rely upon the quickened progress to the internet convention.
Blockchain innovation imitates a wedding function by utilizing the
intensity of a conveyed record to keep confided in records of the “under
standing/exchange” inside a welcoming network. The repeated records over
various clients can approve the credibility of the synchronized substance
of the understanding or exchange. Since 2008, the improvement of bitcoin
turned into the principal case of a blockchain application. This across
the board digital money gives a genuine answer for the test of trust in a
decentralized framework. So, the blockchain is a developing rundown of
records, called obstructs, that are connected utilizing cryptography. Each
block contains a cryptographic hash of the past block, a timestamp, and
exchange information. In other structure, blockchain can be characterized
as decentralized, dispersed, and open advanced record that is utilized to
record exchanges crosswise over numerous PCs so any included record
can’t be modified retroactively, without the change of every consequent
block model.
52. 21
Information Technology Evolutions in the Manufacturing Sectors
In the course of the most recent decade, a few imaginative industrial
facility computerization designs have been built up that influence the cloud
computing (CC) worldview to improve the adaptability and adaptiveness of
the shop floor. Be that as it may, their genuine reception by the assembling
business is as yet restricted, due predominantly to execution and security
requirements. The fourth modern insurgency incorporates IT frameworks
with physical frameworks to get a digital physical framework (Figure 2.3)
that gets this present reality a computer generated experience.
FIGURE 2.3 Digital physical framework.
Some central parts of Industry 4.0 are: CPF, digitization, integration of
vertical and even worth chains, digitization of item and administration,
innovative computerized plans of action, IoT or remote, automation or man-
made reasoning or apply autonomy, and simulation/enlarged/augmented
experience (Table 2.1).
The Fourth Industrial Revolution, authored by the World Economic
Forum’s Klaus Schwab a couple of years back, is no exemption. One of the
additionally fascinating trendy expressions inside this is Industry 4.0, with
supporters guaranteeing that the development of amazing registering and
53. 22 The Role of IoT and Blockchain: Techniques and Applications
AI-based advancements will change modern procedures. With the goal for
organizations to change their modern procedures with problematic innova
tions, they first need to comprehend what those advancements are able to do,
how they will affect the current biological system and what advantages they
will bring.
TABLE 2.1 Advantages of Industry 4.0 Over Manual Manufacturing Industry
General Manufacturing
Industry
Industry 4.0
Subjects Data Source Attributes Technology Attributes Technology
Components
Machine
Production
system
Sensor
Controller
Manufacturing
system
Precision
Operation
and quality
control
Productivity
and quality
control
Smart
sensor
and fault
detection
Condition-
based
diagnostics
Work and
waste
reduction
Self-
aware and
self-predict
Self-aware,
self-
predict and
self-compare
Self-confi-
guration,
self-
maintenance
and self-
organize for
the system
Useful life
prediction
by
simulation
softwares
Health
monitoring
Worry-free
production
system
Assembling organization can change to assembling 4.0 through certain
substance, for example, the keen production line, digital physical observing
frameworks, and extensively pursues these four standards:
• Straightforward Data: It is imperative that a virtual duplicate of the
physical world can be made, and this must be done if information is
uninhibitedly accessible, from crude sensor information appended to
machines as far as possible up to a higher-esteem, logical data.
• Interoperability of Parts: The IoT supports Industry 4.0 and takes
into consideration the different machines, gadgets, and sensors to
discuss adequately with each other.
• Specialized Help: Innovation ought not to be put resources into only
for it, yet rather on the grounds that it gives clear help to people, either
in carrying out their responsibility or settling on educated choices.
54. 23
Information Technology Evolutions in the Manufacturing Sectors
• Decentralized Choices: By making data progressively straightfor
ward and promptly accessible, it should move the basic leadership
process nearer to the point of activity, with just remarkable choices
raised up the chain of command.
Here the organization’s recommendation to set up an assembling organi
zation for Industry 4.0 with the following significant territories, are:
1. Create industry 4.0 methodology;
2. Select the correct group and the privilege computerized instruments;
3. Focus on improving procedures;
4. Implement new advances;
5. Improve data the board;
6. Appoint an individual or a group to lead the computerized change;
7. Understand shopper/customer needs.
As a modern innovation, blockchain offers a reachable reply for allowing
a protected and decentralized open file that a significant mass of stimulating
new innovation applications in a few regions such as IoT, cyber-physical
systems (CPS), manufacturing, supply-chain, etc.
2.4 DIGITAL TECHNOLOGIES AND INDUSTRIAL
TRANSFORMATIONS
Digitalization offers the assembling business fresh out of the box new
chances and choices for successfully reacting to these market patterns. On
the off chance that organizations need to misuse the maximum capacity of
digitalization notwithstanding, they should have a correspondence arrange
that is customized to their particular necessities. There is no other method
to ensure far reaching access to every pertinent datum-nonstop and progres
sively. This thus makes the conditions for fundamentally quicker, progres
sively adaptable, and increasingly proficient generation forms.
1. Level 1: Keen Association: The capacity to oversee and secure
information set aside a few minutes because of smart sensors and to
move them with explicit correspondence conventions.
2. Level 2: Information to-Data Change: The capacity to total infor
mation and convert it to esteem included data.
56. Bran are there alone. Rupert wrote and told me too."
"That is understood," said Westenra coldly. "Or I should n't let
you go to her, even for a few days."
"Where are you going?"
"To a hotel, of course. I 've arranged for a room at the
Metropole."
Haidee mused awhile, her brows knitted.
"And afterwards, Garry--when you have got Bran?"
"God knows, Haidee." He did not speak like a man who has won
fame and renown and almost all he set out to get--except one small
thing! But rather as one whose golden gifts have turned to ashes in
the mouth, whose laurels have fallen to dust. Inspiration shot into
Haidee's eyes.
"Then you haven't got a wife at all, Garry?"
"Devil a wife!"
"Then I don't see why I can't marry you at last. I 've always
wanted to."
Westenra began to laugh.
"There's nothing to laugh at. Lots of girls marry their guardians.
Oh, do let me marry you, Garry. I do love you so."
"Dear Silly Billy, I couldn't possibly."
"Why not? Why not? How can I come back to America with you
and Bran unless I am married to you? It would not be at all correct."
(Haidee had not been brought up in conventional France for
nothing!) Westenra grinned sardonically.
"And if you get Bran away from Val, he will need a mother, and
you surely would n't marry some old strange pig of a woman to mind
him. He 's a gentle little kid and he must be mothered. I believe he
57. 'd just die if he did n't have love and kindness round him all the
time."
Westenra left off laughing and for the first time considered her
seriously.
"Do you think you 'd make him a good step-mother, Haidee?"
"I love Bran, though I 've often been a pig to him--but that's
Val's fault," she ended vindictively. "Oh, do have me, Garry."
"Well, we 'll think about it," said he gravely, though the
suspicion of a smile hovered in his eyes. Haidee pounced upon him
with her fresh lips.
"Won't I just run your nursing home for you!"
"Oh, that!" said Westenra, startled. "It runs itself now. Besides"-
-("No more experiments like that," he had been going to say, but did
not)--"I have practically given it up. There'll be nothing for you to do
in New York but mind Bran and amuse yourself."
Haidee looked glum for a moment. It was plain she was dying to
run something.
"Anyway it's settled, is n't it, that I am to marry you and go
back with you and Bran?" She flung her arms imploringly round his
neck. Gently and a little wearily he unlaced them.
"All right, dearest, if you 're so keen on it, you shall go--but we
won't get married just yet, I think--" He patted her hand
affectionately.
"You 'll meet some one you like better than me on the voyage,
perhaps."
"Never, never," she said almost viciously, and her eyes seemed
to look down a long passage which had some one at the end of it.
58. "At last I 've got some one away from her!" she murmured to
herself.
Westenra, even though in the past few weeks he had grown
used to her extraordinary childish innocence and ignorance of life,
mixed with a leaning for outlawry, an amazing respect for étiquette,
and an anxiety to keep up a conventional appearance, found this
new phase incomprehensible. He could not understand the gloating
triumph of her manner. She behaved as if he were a hunting trophy
which she had long yearned to bag. A dozen times she would jump
up from her seat, examine him proudly, hug him, and sit down again
murmuring:
"I've got you--I've got you, haven't I, Garry? No one can get
you away again, can they?"
"Of course not, Silly Billy," came to be his standard reply.
――――
Times are when a traveller arriving at Cannes railway station
needs the physique and temper of a thoroughly-aroused buffalo to
make any impression on the crowd that surges and sways and
laughs and greets and grumbles there. But on the early June
morning when Westenra and Haidee Halston descended from the
P.M.L. Express there was no one in sight expect a few somnolent
porters and a tall woman holding a small arrow-straight boy by the
hand. The woman was beautifully dressed in white linen and a hat
smothered with red and yellow poppies. The arrowy boy had a
waving topknot of shiny, ruddy-gold hair, with bare legs and
sandalled feet to make a sculptor rave.
59. Haidee having seen them last recognised them first. But even
she had to give a second glance to make sure that it really was Val
and Bran. They both looked so well and charming and beautiful to
behold. Bran had never had clothes so truly magnifique before. And
Val had roses in her cheeks and lips--a strange thing in so hot a
climate! Somehow the triumph Haidee had been exulting over and
vengefully trumpeting in her heart died down and faded away when
she saw Val coming towards her, hands out in the usual eager
fashion, a kiss forming on her lips. Both she and Bran at the back of
their welcoming smiles seemed to be wearing their wistful lion-cub
expression, and Haidee had to grip hard on to her vengeance not to
lose it altogether and just fall upon them both and hug them.
Westenra, too, was aware of a sensation that surprised him, at the
sight of this woman who had once been so much to his life and now
was nothing, standing there with frank outstretched hands smiling a
welcome from under her cool flowery hat. The fact was that she did
not sufficiently look the part of a shrine-smasher. If he had not
happened to know her guilty it might have been quite difficult for
him to believe that this was the woman who had destroyed his life-
dreams--and ruined his home. As it was he could only marvel at the
strangeness of women who could do such things and yet retain a
look of honesty and inward peace. He marvelled, too, that as he
took her hand and looked into the eyes he knew so well his heart
stirred like a live thing. He was more amazed by that strange stirring
in his breast than if a body he had certified dead and seen put away
into the place of dead things suddenly quickened in its shroud and
returned to life. For he had in the last few years deliberately fought
down and crushed out his feeling for Val as a man might crush and
60. kill a useless, hopeless thing. It was useless that madness he had
felt for her--as useless as she was and always would be to a sane,
practical man. There was no use or sense in letting the pain of his
longing for her get the upper hand of him and he had not let it, but
wrestled with it until he got it under. Had she not shown him in
Jersey that she did not care enough for him to change? Shown him,
and told him, and proved her words with deeds. And it was all old
grief and pain now. Even if he had still retained any feeling for her
she had gone back to Valdana. That ended it all as definitely as if
she lay before him in her coffin. He would never have risked seeing
her again if it had not been for his son.
Ah! his son! That was different. It was natural and justifiable
that his veins should thrill at the sight of such a brave stripling. Bran,
for all his elfin faun-like grace of body, had a big face, with the
promise of big things lurking behind its plastic contours and deep-set
eyes. He sprang into his father's arms and kissed him ardently.
"Oh! Daddy, I do love you."
Val's face curiously gave the impression that it had grown pale,
while the colour in her cheeks and lips "stayed put"--almost as if it
had been "put." Haidee was interested in this phenomenon, but
there was no time to give it more than passing observation, for
Rupert Lorrain suddenly flashed into the scene with the
announcement that he would drive them back in his motor. They
engaged in a bustle for luggage, of which Haidee had apparently
brought a mountain--and a few moments later all were packed into
Rupert's luxurious Panhard and flying along the route Nationale,
Bran tooting the siren and singing at the top of his voice.
61. "Sing before breakfast, you 'll cry before tea," quoted Haidee at
him. She had to shriek to be heard.
"Shall we drop you at your hotel, Garrett? Or will you come to
breakfast with us at the Villa?" Val's voice was the casual gentle
voice of a good friend.
The realisation that he had been calmly and unquestioningly
going back with this noisy crowd as though it belonged to him, to
her villa which was not his, shocked him into a stiff answer.
"At the hotel, please. And I 'd like Bran to stay with me this
morning, if you don't mind."
"Oh, yes," cried Bran, ecstatically. "I'll come."
"I'll bring him back safely to you after lunch."
"Of course," said Val, smiling radiantly. It is on record that
martyrs could radiantly smile even when the slow fire was applied.
So he and Bran were dropped at the Metropole, not without
many proprietary grumblings from Haidee and warnings from Rupert
that he would be back to join them ere long. The car drove off
amidst a shower of shouts and calls and farewells. Only Val sat silent
under her poppies.
As soon as they were on their way once more, under cover of
the motor's burr, Haidee said, staring Val defiantly in the eyes:
"Garry and I are engaged."
It never occurred to her that Rupert had in any way prepared
the way for her announcement, and she was blinded with
amazement and fury that Val took it so serenely. True she once more
got the impression of pallor under that unwonted colour in Val's
cheeks, but the latter's eyes were very big and bright and friendly
when she said quietly:
62. "That is very wonderful news, chicken."
That was all! The lovely dark face under the Congo orchid grew
darker.
"We shall be awfully happy," she said fiercely. "And never think
of this rotten old Europe or any one in it again."
Val spoke a strange saying, laying her hand on the girl's.
"One should try alway to keep a little dew in one's heart,
Haidee, or else, in the heat and weariness of the desert it may dry
up and blow away like a leaf."
Haidee wrenched her hand away.
――――
"And what do you think of being when you 're a man, Bran?"
Bran reflected a while, balancing a spoonful of strawberry ice-
cream on the edge of his glass.
"Well, Daddy, sometimes I 'd like to be one of those professors
that feed the animals at the Zoo, you know. But after all, I think I
prefer to be an engine driver." The little golden face looked up into
Westenra's with the perfect confidence and frankness of a nature
that has never been snubbed or thwarted. "You see one could be
always going to new places."
Westenra's heart sank. He got a sudden vision of Val smiling
that very smile of boyish confidence as she looked up from a deck
chair saying:
"I would love to wake up in a new place every morning of my
life."
63. Good God! was it possible that it was after all only a child, no
better or worse than this golden-headed stripling, whom he had had
in his hands all these years, treating harshly, misjudging, scolding,
neglecting? The thought was horrible, but it pierced as though it
were true.
"What is the good of that, my boy?" he said gently. He shrank
from losing that lovely confidence by an unsympathetic word, but--
"What would you do in all those new places?"
"Do?" Bran mused a while. "Oh, there'd always be something to
do, Daddy. Sometimes the people there would want a bridge made,
or a tower built, or there might be a giant there eating all the little
boys and girls. Then I would stay just long enough to kill the giant,
you know, or make the bridge----"
"I see."
"Or sometimes I would just make a picture of the place."
"A picture?"
"Yes, I love to make pictures--then get on my engine again and
away I 'd go."
So! This was what she had made his son into? A vagabond like
herself, a wanderer, a seeker after nothingness? He said it bitterly to
himself, yet there was no echoing bitterness in his heart. The boy's
eyes were so sweet and clear. There seemed no base thought in any
corner of him. And that big head and wide glance--surely something
great would come of them! The boy looked at the world as if it had
been made for him. Surely Raleigh had that spirit, and Drake, and
Napoleon, and Cecil Rhodes. Surely it was the spirit of great
adventure!
64. He spent a strangely happy day with his son. Unreal, yet as
natural as if he himself had lived every moment of it before. When at
last they came to the Villa of Little Days it was to find the others
gathered together in the garden, sitting under the spiking pines.
Capacious easy-chairs with bright cushions stood about on the
gravelled terrace and everywhere was colour, colour. Blue above, and
blue below, and round them on shrub and tree and plant every
known and lovely shade that Nature could invent, all woven and
blended as skilfully as the broidering on some masterpiece of
tapestry. Val too had returned in jewels and dress to her love of
oriental colouring. She had two large silver rings set with turquoises
in her ears, and round her neck a chain of rugged chunks of
malachite and turquoise-matrix. None of these things were
expensive. She never bought jewels because they were valuable, but
for the sheer colour of them and the joy that colour gave. Diamonds
said nothing to her and she would never have worn them if she had
been a millionairess. The ear-rings were a spare pair of Marietta's
which she had been delighted to sell Val for a couple of louis; matrix
and malachite are, as every one knows, almost as common as sea-
shells--and so are violets common, and poppies of the field, and
forget-me-nots; but none the less are they the colour-gifts of God
and the world would be a less beautiful place without them. Her
gown of some kind of flexible opaline silk blended with the colours of
the garden, even with the poppy hat which she still wore. Westenra
had never seen her look so much at peace with herself and her
surroundings or realised before that she possessed beauty. He did
not realise indeed that never had he seen Val in beautiful clothes nor
in surroundings that were full of grace and peace. Always he had the
65. picture of her rushing about the house in 68th Street like some
driven wild thing, the worried look of a hunted creature in her eyes,
the grey linen overalls typical of the grey hurrying life, making her
eyes grey only, without a glint of the blueness which now made
them so attractive.
They sat and talked, spying with field-glasses at the warships in
the bay. Naval manoeuvres had been going on for some days, and a
large portion of the French fleet lay out in the blue, throwing great
purple shadows upon the water and sending up streamers of black
smoke to heaven.
Rupert, as much at home in the family circle as if he belonged
to it, seemed to wish to monopolise Haidee, but she kept
withdrawing from his advances and plying herself to the task of
playing proprietress to Westenra. She sat on the arm of his chair
with her arm along his shoulders, deferring to him in everything,
constantly referring to New York and their premeditated return
there. Westenra, with Bran perched on the back of his chair, legs
dangling round his father's neck, hands occupied with his father's
hair, was forced into announcing plans of some kind. He disclosed a
contemplated return to Paris to deliver two important lectures at the
Sorbonne. That done, he should return South, and book by some
tramp steamer which would take him home via Greece and Algeria,
sailing from Marseilles.
"Don't forget that I'm coming too," said Haidee feverishly.
"How could I?" Westenra's smile was dry.
"Me too, Daddy," chirruped Bran. A kind of breathless stillness
fell for an instant. Every one save Bran, busy with his father's hair,
looked swiftly at Val and as swiftly away again. Val sat like a stone
66. woman. In the silence Bran, who had gone on twisting his father's
hair into little spikes, spoke again placidly:
"Me too, Daddy. I don't want to be away from you any more."
A pang of joy and triumph shot through Westenra, but it was
mingled with something that cut like a knife on an open wound. Val
was staring before her sightlessly. Yet a little smile played round her
lips--a smile of some feeling Westenra hardly understood. There was
something infinite in it, yet terribly human.
"You would rather go back to America than stay with me,
Brannie?"
It was not pleading, nor sad, nor coaxing. Just a little simple
question. Only she and Westenra knew how much hung on it,
though one of the others had a very good notion of what was
behind. Bran looked across at his mother hesitatingly. She had
always trained him to truth and directness, yet he searched her face
for a moment as if for a clue. Bran hated to hurt any one's feelings--
most of all his mother's. But she smiled on, and he could read
nothing. He had never seen her eyes so empty before, and could not
know by what great effort she had emptied them of all the fierce
love and terror in her heart, so as to play fair, and not bias the issue.
So after a little moment Bran said:
"I like daddy. He's got a hard smell--like steel. I don't want to be
away from him any more." He slid an arm round his father's neck.
No one looked at Val. Suddenly and amazingly Haidee cried out in a
fury of indignation:
"You are a little pig, Bran! ... an ungrateful little pig!"
She burst out crying, and jumping up ran to the house. Bran's
eyes slowly filled with tears.
67. "Haidee is nasty!" he said in a trembling voice. "What have I
done?" In his trouble he turned naturally to his mother and the
tenderness that had never failed him.
"Nothing, my Wing. Haidee will be all right by and by. Here is
Marietta with the tea."
But Westenra would not take tea. He appeared to stiffen at the
sight of it. After Bran had swallowed a hurried goûter, as the French
call it, his father took him by the hand and they went away together
for a walk by the sea. When they came back at seven, Westenra
excused himself, and returned to the hotel with a promise to call
after dinner.
――――
That evening he and Val walked together through the twilight
garden in which Gambetta had pondered his plans and philosophies.
They, too, had a problem to consider. It had to come, this talk
together. They both had felt the imperativeness of it. And now both
were remembering that other walk on the moonlit cliffs above St.
Brelade's Bay, when the curlew wailed and cruel words were said
that separated them as only cruel words can separate, driving them
apart for ever. Even as Val had struggled that long-ago night for
words to explain and condone the situation Westenra struggled now,
while Val walked beside him still and white, but with some hidden
strength in her which he felt while he could not understand it.
The curious thing was that, though he had meant to upbraid
her, though his heart was bitter against her, he found himself
speaking as if he, not she, were the defalcator.
68. "I suppose you think me a cold-blooded brute?"
With that which Haidee had told her still tingling in her mind she
could not pretend to misunderstand, but she tried to be fair.
"You know your own interests best, Garrett."
"Oh, as to my interests--" He found that a strange answer, and
cogitated on it for a while.
"Haidee is devoted to you and your interests."
"Haidee? I should not be such a fool as to expect that--again?"
No doubt he meant that javelin to reach her. If it did she gave no
sign. Only her next words might have been a faint attempt at a
return thrust.
"Even Haidee would not find it a very difficult life since things
are so prosperous with you now."
He answered swiftly: "Yes; the law of compensation has been
busy with my affairs. Unlucky in love--" The sentence remained
unfinished.
They found that they were standing still, staring white-faced at
each other. For a moment they stayed so, then she said gently:
"Surely we have not come here to gibe at one another? I--I bear
you no ill-will, Garrett." It was such a strange way of expressing her
feelings that she could not help but stammer a little.
He laughed. Strange, that he who felt so old in the train that
morning should now feel young enough for fierce anger and rage.
"That is good of you. I am sorry I cannot with truth claim to
reciprocate your generosity."
The calmness that had amazed him sustained her now.
"Well, let us leave the subject then, and speak of one that
matters more to our future life--Bran. What about Bran?"
69. "You saw yourself to-day--you heard." He did not care to keep
exultation from his voice.
"You think it fair, then, to take away from me what I have lived
and worked for these last six years?"
"Have not I worked for him too?"
"You may have done so. It has made no difference to him."
"What do you mean?"
"I mean that since we parted in Jersey, Bran, like myself, has
neither eaten nor drunk nor been clothed at your expense."
"But...?"
"The exact half of all moneys you have sent is lying at the Credit
Lyonnais. The other half has been spent explicitly on Haidee. You
have seen the bills."
His face darkened.
"How dared you treat me so?--my own son!"
"If you had come to see him it would have been different, but to
stay away year after year, and expect money to fill the gap that a
father's influence and love and tenderness should have filled ... that
seemed to me too mercenary, too unworthy treatment of my son."
"No matter ... no matter ... it is an infamous thing you have
done--a crowning act of cruelty. I should have believed you
incapable of it. By God! how dared you let any one else feed and
clothe my child?"
She looked at his furious face in genuine amazement.
"Had I no right to work for him?"
"You, yes; and I know you have--Haidee has told me. But this
last year ... and now. Who is paying for all this?" He swung his arm
70. savagely at the beauties of the garden. His gaze was full of rage and
contempt.
"In leaving Bran I left my honour with you--and you have sold it
for this mess of pottage! It is time he went with me!"
She faced him steadily, with the calmness born of long vigils
with misery.
"You are insulting me unnecessarily. No one has supported your
son but myself."
He stared at her in unbelieving wrath. But something about her
words and still gaze presently quieted the fury in his veins, and he
spoke more temperately.
"I will be glad to accept that. It is strange that by your own
efforts you should have become wealthy enough to surround him
with beauty and ease such as this--but if you say so I accept it."
There was a silence.
"My own efforts had nothing to do with it, Garrett. It is only that
God has been good to me. Did you ever hear the saying, that 'God
takes care of drunkards and children'?"
He regarded her long and earnestly.
"Are you a drunkard?" Anything less like one he had never seen.
His medical experience told him that she could not be one. No
drunkard could look as she did.
"No, Garrett. I can faithfully and truthfully say that I am not a
drunkard."
Then she was a child. It was a child that he----!
"Let me tell you about it," she was saying. "About eleven
months ago something that might be regarded in the light of a
family legacy came to me. The necklace my mother gave me turned
71. out to be of extremely valuable pearls. I sold it for seventy-five
thousand pounds--it has since realised one hundred and twenty
thousand. That is the secret of such comfort and ease as you now
see us enjoying."
The story was amazing, but Westenra instinctively knew it to be
true. He had often been struck by the wonderful pearly beauty of
the Comfort necklace.
"I am glad for your sake," he said at last; "it must simplify the
future a great deal. I beg your pardon for what I said a moment
ago. It is bad enough that I should have been denied the right to
support my own son--but I could not bear that that other fellow
should have done it. It even sticks in my gorge that you should have
allowed Bran to come into contact with him."
"Whom are you speaking of, Garrett?"
"Why do you ask that? Surely you do not think me unaware of
the fact of your return to Valdana?"
"Ah!" she said softly, and drew in her breath. "You know that?"
"Of course I know. It was that knowledge which brought me to
France. I could not allow Bran or even Haidee, to be anywhere
within the radius of that--" He bit off "scoundrel."
"Neither of them has ever seen him----"
"I thank you for that at least."
"Nor would ever have seen him."
"Oh, as to----"
"Is that the reason you would not enter my house nor accept
my hospitality?"
He did not answer, but his neck stiffened, and he gave her the
direct look which she well knew meant assent. And she thought to
72. herself:
"There is not anything base and odious of which he does not
think me capable. It is well that he and I should part for ever. The
soul constantly suspected of baseness and cruelty must become
degraded in time and shrink away to nothing. I will go away from
here to places where my soul can grow and not shrink." These
thoughts passed swiftly through her mind. All she said aloud was:
"You need not have feared. Horace Valdana has never come
here, nor ever will. He and I will not meet again."
They had come out of the shadowy whispering paths and
reached the open gravelled terrace, with the still waters of the
Mediterranean lying below, silent under the stars, sombre as a pool
of blue ink. The little group of chairs stood inviting. By mutual
consent they sat down. Inside the Villa Haidee was at the piano
playing wide, gallant chords, to which Rupert, in a rather strong
tenor, sang snatches of the Paimpolaise.
"Et le pauvre gars ... fredonne tout has:
* * * * *
'J'aime Paimpol et sa falaise,
Son cloche et son grand Pardon.
J'aime encore mieux, la Paimpolaise
Qui m'attend au pays breton.'"
"Of course," said Westenra slowly, "if you are alone, and are going
to be alone ... I have no right to take Bran."
73. "There is no question of right--" She put her hand over her
heart--she could not speak calmly of this last savage blow fate was
dealing her by the hand of her loved son. "He wants to go. That is
enough."
"You know I will mind him well," he said gently.
"No one can mind him as I do," was her inward cry, but she said
nothing, only pressed her hand harder to her side.
"----and that he will come back to you. It is only fair that I
should have him for a little while, but naturally I do not want to keep
him from you, and I am very sure he would not stay."
She was still silent. He looked at her keenly. Each knew what
the other suffered, for at the heart of each the parent hunger
gnawed with cruel teeth.
"You will not beguile him from his wish to come with me?--I am
very sure you could. It would be natural for him to stick to you after
all you 've done for him--but you won't?" Almost he was pleading
with her.
"Did I to-day?" Her face was bleak.
"No, God knows--and it would have been easy enough!"
"I know he needs you. A boy begins to need a father's
influence, and Bran has always had a hunger for men and their ways
... but, oh! mind him well, Garrett Westenra ... mind him well ... give
him back to me as sweet and whole in soul and body as I lend him
to you--" Her voice broke. She could bear no more. Swiftly she rose,
and with a little gesture full of despair and abnegation and farewell,
left him.
――――
74. The next day Westenra was gone, presumably to Paris to give
his lectures. Rupert, who had walked home with him the night
before, brought a brief message of farewell to the Villa of Little
Days, and the news that they might expect him back in anything
under ten days.
As for Val, she went to bed for a week. At least she retired to
her room, declaring a fear that a slight cold she had might develop
into grippe, and that summer grippe was the most boring of all
illnesses, and that she was not going to risk becoming the greatest
of bores. So she lay down a good deal in a darkened room. When
she was not resting she wrote many letters, and in the cool of the
evening she would sit on her clematis-wreathed balcony with Bran in
her arms, her lips on his hair, listening to his account of the day's
doings. For Rupert's car was perpetually at the gate, and never a
day passed but he and Haidee and Bran set off on some long
excursion into the surrounding country.
Haidee came up to Val's room sometimes to make perfunctory
inquiries. She would stare hard at the latter lying so lazily amongst
her cushions, and narrowly search the smiling face. But, except that
colour had fled from cheek and lip, Val showed no signs of trouble,
only a vivid interest in all they had been doing.
"You do take it easy, I must say," Haidee remarked half
grudgingly the fourth evening after Westenra's departure. "Lying
here in the cool while we have to scoot about in the heat and dust."
Val laughed.
"You don't have to, chicken. And scooting in a motor is not so
very disagreeable after all. You look as if it agreed with you,
anyway."
75. Indeed the girl was radiant, and her half-hearted grumblings
were entirely contradicted by her eager air of enjoying life. She need
not have resented that Val smiled so brightly from her bed, and
perhaps she would not have done so if she could have seen that
when the door closed on her the light went out of the smoke-
coloured eyes, and the smile withered, leaving only weariness upon
Val's lips.
But on the day Westenra's return was notified by telegram Val
came down very bright and gay and presided over the tea-table
under the pines. Rupert had just brought the others back from
Grasse in a condition of physical flop, and all three were distributed
upon chairs in attitudes of utter abandon. Val, with all the colour
back again in her pale dark face, looked fresher than any of them.
Westenra's wire was a subject of great intrigue. It had come not
from Paris, but from a little out-of-the-way place called Baurem les
Mimosas, which lay about two hours from Cannes and not even on
the main line! No one knew by which train he was coming, or where
to go and meet him.
"I don't believe he has been in Paris at all," said Haidee
discontentedly, and certainly the man who at that moment appeared
at the top of one of the winding paths and came strolling towards
them bore no stamp of Paris on himself or his raiment. His face, in
spite of the protecting brim of a cow-puncher's hat which had clearly
seen life and experience in other climes, was badly sunburnt, and he
wore a truly disreputable grey flannel suit of the reach-me-down
class, and evidently made for the French figure rather than for an
Irishman of large and athletic build. The waist and hip
measurements were of such amplitude as to give a slightly bouffant
76. effect, but the calf accommodation was limited to bursting point; the
rest of the trouser-leg would have hung in frills round the ankles had
they not been secured tightly by large white safety-pins. A pair of
"Weary Willie" canvas shoes completed Westenra's outfit.
"Garry!" gasped Haidee, shocked beyond words. But Bran
leaped upon his father and embraced him joyously.
"Where you been, Daddy?"
"I been bicycling," responded daddy affably and saluted every
one, beginning with Val and ending with Rupert. "That's where I
been!"
"Bicycling! What a thing!" cried Haidee, while Val made him
fresh tea. "How could you come through Cannes such a sight,
Garry?"
"What's the matter with me? I feel good in these togs. In future
I shall always dress like this."
Haidee shuddered.
"You did n't go to Paris after all?"
"No, Haidee, I did not go to Paris. I hired a bicycle, bought this
bicycling suit you don't admire, and took to the open road. There
isn't any village between here and Toulon that I haven't explored
inside out, nor any 'café débitant' where I have n't sampled the
chianti or the astispumanti or anything else that was tanti."
"But what for, Garry? Why?"
"I had some thinking to do," said Garry, "and I thought I could
do it better on a bicycle than in Paris."
"Have you thought about when you're going to take me in a
ship, Daddy?"
Bran had climbed on his knee.
77. "Yes; I 've been thinking about that, my son."
Haidee said abruptly:
"Did n't you say we would take one of those tramp steamers
that go from Marseilles, and touch at all sorts of ports?"
"That was the idea." Westenra held up a cigar to Val, and she
nodded permission to smoke. "Why?"
"Well, as Rupert is going to Morocco next week I thought we
might as well take the same ship." Haidee sounded rather
breathless.
"Ah!" remarked Westenra thoughtfully and lay back in his chair,
his face between the knees of Bran, who had climbed up into his
favourite position.
Rupert murmured something about that being "an idea bien
gentille" and hunted nervously for a cigarette.
"In that case," announced Val quietly, "we shall all be sailing
from Marseilles at much the same time."
"All?" Every eye was immediately focused upon her.
"You----?"
"But you 're not coming--" Haidee broke off confusedly.
"No; but I am leaving France."
"Leaving France?" ejaculated Rupert.
"Yes, leaving France, and all cities, to go back to the life I lived
as a child and which has been pulling and calling me ever since."
"What, that life in a waggon?" Haidee had heard of it so often it
was strange she should become so excited about it now.
"Yes; a waggon that starts every late afternoon, and treks
throughout the night; and brings you to a fresh place every
morning." Her face suddenly lost the veil of shadows that had hung
78. over it so long. Space, and joy and distance, and a fierce wistfulness
came into her gaze. "One goes on and on to places one has never
seen before, sometimes to places no one has ever seen before--that
is best, that is wonderful----"
Strangely the veil that had passed from her face seemed to fall
upon the faces of her listeners. Not one among them but looked
curiously disturbed.
"I shall see the wildebeeste grazing on the horizon once more--
and hear the guinea-fowl in the bush crying 'come back! come
back!"
Westenra stared at her. Was this the woman who had run his
nursing home!
"Everything in nature, if you leave it alone, will come back--to
the ways of its early life."
"If you leave it alone?" Westenra spoke almost involuntarily. She
laughed.
"Am not I going to be left alone?"
There was a silence. Every one sat staring at her.
"Who but I would care for such a foolish life!" she said more
sombrely.
"But wouldn't I?" burst out Rupert. "It is what I have always
longed for. To coucher à la belle étoile! Zut, alors! I will come too. It
is understood."
Val laughed.
"You would soon be bored. One must be a wanderfoot by birth
and instinct."
But he repudiated the saying, and there was no boredom in his
eye nor in the eyes of any. An odd uneasiness possessed them all.
79. Haidee looked paler and was biting her lip. Bran had descended from
his father's shoulders and advancing on Val stood looking at her, a
startling reflection of her fierce wistfulness in his own eyes. But he
still kept a hand on his father's knee.
It was Marietta who broke up the séance by coming out to
announce in an autocratic manner that dinner would be ready in ten
minutes. No one had realised that it was so late. Westenra did not
accept the invitation to stay and dine as he was, but having secured
its extension to the evening sprang on his bicycle and rode for his
hotel to the endangerment of several lives on the route Nationale.
It hardly seemed an hour before he was back again, very big
and handsome in conventional dress, among the tranquil trees of the
garden. The place was silvered and transformed by the light of the
moon, which, at the full, hung like a great luminous pearl on the
radiant breast of heaven. The windows of the Villa were all set wide,
and in the drawing-room Haidee's fingers were weaving fairy tales at
the piano with such magic that they seemed real voices and hands
that called and tugged at Val and Rupert under the trees. The boy
stirred restlessly in his chair, gripping its sides. Since dinner Val had
been sitting there, very silent, while Haidee played.
When he heard the bell tinkle on the garden gate far below, and
knew that some one, probably Westenra, was entering, he said
suddenly:
"I forgot to tell you that the other night when I walked home
with the doctor I happened to mention to him ... that ... well, that I
was with you at the funeral of Mr. Valdana."
"Ah!" Val sighed strangely and sat up straight in her chair. It
was too late for anything more to be said. Westenra was upon them.
80. And since Rupert, vacating his chair, was already on his way to the
drawing-room, it was quite simple and natural that Westenra should
sit down beside her. They talked, a little disjointedly about the
beauty of the night, how well Haidee played, what a charming fellow
Rupert was. Then he said suddenly:
"And you are really going back to that wild wandering life of
yours, Val?"
It was the first time he had called her Val in all these years. She
trembled a little, answering sadly:
"Like water, I must return to my own level."
"Then you should live on the mountain tops."
She trembled again and her heart ached a little more
poignantly. Why should he mock her?
"You think you will be happy?" His voice was not mocking, only
very gentle.
"Oh! happy?" she echoed. "Who is happy? But--
'Give me the long white road, and the grey path of
the sea,
And the wind's will, and the birds' will, and the
heartache
still in me,'
and I will reproach no one."
"Reproaching has never been a pastime of yours, I think--and
you may be glad of it, Val, for reproaches, like curses, have a way of
coming home to roost. My conscience is no better than an aviary----"
81. Her involuntary laugh lightened the strain a little, but Westenra
was a thorough man, and did not mean to leave it at that. Sombrely
he finished.
"I beg your forgiveness, Val, for every reproach I have ever
made you in your capacity as wife, mother--or lover. They were
undeserved, every one!"
Why should his voice have grown hoarse at the last, and her
heart come climbing up into her throat as if to suffocate her? It was
some moments before she could half-whisper, half-mutter a
response.
"You are too generous; I deserved everything you ever said--but
after long thinking I see--that--we cannot all win out as wives and
mothers. Of some of us, when you 've said we are good lovers you
've said all. I hoped I was a good mother too--but it is plain that I
am not, for Bran, even Bran on whom I had staked my last throw--
even Bran leaves me--"
Strange that Haidee should choose this moment to launch forth
into the first trembling plaintive notes of the 17th Sonata, that
wonderful pæan of terror and beauty under whose rushing spell
seven and a half years agone Val had lain her face against her
husband's and shared with him the greatest, sweetest secret that
can ever lie between man and woman!
"Bran shall never leave you--if you will have me with him--or
even if you will not."
"Garrett--what are you saying?"
"'The years teach much that the days never know.' Val, I have
realised during the last seven days what I have been learning ever
82. since you came into my life, that everything is worthless but the love
and happiness of the woman you love."
"Oh, Joe!" she cried in great humility and wonder. "You with all
your gifts of mind and brain; with all you have done for science, and
still will do----!"
"It can all go to the devil," he said cheerfully. "I 'm coming to
live with you in a waggon on the veldt, to see the wildebeeste,
whatever they may be, grazing on the horizon, and hear the guinea-
fowl calling from the bush. These things have got a hold on my
imagination and will never let go. And if I can't do something for
science, even out there on the veldt, I 'm a poor sort of fellow and
will deserve to be forgotten."
"But the rewards you have already won--that are just within
your grasp?--the chair at Columbia--the Nobel--the--" (She herself
set no store by such things, but well she knew how men value them
more than their immortal souls.)
"Too bad!" said Westenra, with an ironical smile. "Did you ever
hear of what John L. Sullivan said the day after his defeat at New
Orleans? A sympathiser came wheedling up to him, saying: 'It's too
bad, Jawn! Too bad! What 'll you do now?' Sullivan, real man that he
always was, even in defeat, growled back at him: 'What 'll I do now?
Pugh! Ain't I John L. Sullivan still?' Pretty good philosophy for a pug,
Val! I can only say in all humility--same here! Even in defeat I----"
His words were cut short by a very whirlwind of lace and tears
and laughter. A pair of arms were thrown round Val's neck, and a
sobbing, happy voice cried, loud enough for all who wished to hear:
"Oh, Val--I love you, and I beg your pardon. I am a pig from
away back--and a cat and a beast--but oh! I am so happy! Rupert
83. and I are going to get married to-morrow, and after we have been in
Morocco a little we shall come out and join you in your waggon."
Westenra stood up big and grim in the moonlight.
"Hell's blood and blazes!--and is this the way I am thrown down
at the eleventh or any moment?--bring me the bridegroom, and I 'll
eat him up at one mouthful. I 'll beat the gizzard out of him--I'll----"
"M'voilà, Monsieur le Docteur! Here I am," said Rupert, not
without dignity, and with great goodwill.
"Well, get out," said Westenra softly, "and take your bride to be
with you. That's all that's required of you for the time being."
He cared not how they went nor where, so long as he was alone
once more with this only woman of his life. He took her hand in his
and drew her close until her cheek lay against his as on a long-ago
night, driving up Broadway to 68th Street. Before them, through the
trees, glimmered a silver expanse of water, with grim warships lying
at rest and little red-sailed fishing boats rocking softly.
"Heart of my heart--does n't this seem to you a fair sea on
which to launch a new ship of dreams."
"No. Not a new ship, Joe. The same old ship. I have never been
out of it for an hour, or a moment."
THE END
84. Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.
More than just a book-buying platform, we strive to be a bridge
connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.
Join us on a journey of knowledge exploration, passion nurturing, and
personal growth every day!
ebookbell.com